IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 247 - 258
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 359 - 368
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 1 > 187 - 193
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 215 - 224
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 492 - 506
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 771 - 780
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 810 - 815
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 681 - 693
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 602 - 612
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 821 - 826
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 5 > 1551 - 1565
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 6 > 1738 - 1751
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 1 > 111 - 120
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 3 > 553 - 562
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 10 > 1620 - 1631
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 3 > 397 - 410
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 3 > 501 - 514
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 3 > 515 - 525
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 3 > 526 - 536
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 5 > 814 - 825