IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 1 > 122 - 139
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 523 - 531
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 775 - 790
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 1-2 > 148 - 159
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 359 - 371
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 3 > 1018 - 1028
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 3 > 944 - 953
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 4 > 1394 - 1403
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 5 > 1604 - 1613
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 6 > 1841 - 1854
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 6 > 1855 - 1864
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 6 > 1825 - 1840
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 9 > 1433 - 1445
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 11 > 1746 - 1759
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 11 > 1827 - 1837
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 5 > 875 - 884
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 6 > 1024 - 1033
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 9 > 1518 - 1526
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 9 > 1406 - 1415
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 12 > 2314 - 2326