IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 118 - 132
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 317 - 330
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 1 > 140 - 150
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 2 > 165 - 178
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 552 - 563
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 530 - 541
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 451 - 459
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 300 - 313
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 518 - 533
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 905 - 919
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 2 > 241 - 255
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 676 - 690
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 664 - 675
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 3 > 1067 - 1080
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 4 > 1339 - 1353
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 6 > 1876 - 1889
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 1 > 136 - 148
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 11 > 1815 - 1826
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 1 > 27 - 38
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 2 > 196 - 207