IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 3 > 386 - 390
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 3 > 390 - 395
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 3 > 350 - 359
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 3 > 374 - 385
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 3 > 360 - 373
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 3 > 342 - 349
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 3 > 311 - 329
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 3 > 293 - 310
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 3 > 330 - 341
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 3 > 395 - 399
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 4 > 502 - 516
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 4 > 479 - 492
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 4 > 457 - 463
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 4 > 464 - 478
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 4 > 493 - 501