IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 38 - 51
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 658 - 669
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 1 > 53 - 58
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 2 > 256 - 266
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 606 - 615
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 616 - 627
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 628 - 639
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 831 - 842
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 853 - 860
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 672 - 681
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 775 - 790
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 640 - 649
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 703 - 711
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 565 - 574
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 1-2 > 208 - 218
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 1-2 > 297 - 309
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 1-2 > 139 - 147
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 1-2 > 148 - 159
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 704 - 716
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 826 - 832