IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 3 > 360 - 373
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 4 > 532 - 542
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-1 > 391 - 401
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-1 > 402 - 412
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-1 > 331 - 340
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 4 > 721 - 733
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 4 > 734 - 743
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 4 > 697 - 709
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 4 > 744 - 757
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 101 - 117
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 192 - 202
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 331 - 338
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 173 - 182
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 3 > 569 - 572
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 4 > 791 - 799
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 4 > 673 - 683
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 1 > 98 - 110
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 293 - 301
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 302 - 317
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 397 - 409