IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 3 > 390 - 403
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 1 > 96 - 106
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 717 - 730
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 5 > 1426 - 1438
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 1 > 205 - 215
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 4 > 619 - 625
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 874 - 887
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 9 > 1497 - 1507
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 12 > 2021 - 2033
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 3 > 426 - 435
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 3 > 375 - 385
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 4 > 633 - 644
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 5 > 801 - 813
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 5 > 839 - 850
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 10 > 1629 - 1640
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 12 > 2327 - 2339
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 12 > 2193 - 2204
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 28 - 39
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 3 > 613 - 625
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1416 - 1431