IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 3 > 386 - 390
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 4 > 457 - 463
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 4 > 440 - 456
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-1 > 438 - 449
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-1 > 462 - 467
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-1 > 450 - 461
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 503 - 512
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 118 - 132
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 3 > 456 - 465
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 3 > 359 - 369
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 3 > 370 - 380
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 1 > 70 - 85
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 1 > 2 - 24
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 1 > 154 - 160
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 2 > 165 - 178
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 2 > 257 - 267
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 2 > 231 - 241
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 318 - 329
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 542 - 551
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 519 - 529