IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 4 > 781 - 792
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 74 - 90
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 101 - 117
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 16 - 28
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 213 - 222
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 1 > 82 - 91
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 492 - 506
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 816 - 825
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 771 - 780
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 1 > 189 - 201
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 1 > 227 - 236
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 372 - 382
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 809 - 820
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 3 > 992 - 1002
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 5 > 1566 - 1577
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 5 > 1448 - 1458
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 5 > 1536 - 1550
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 1 > 64 - 75
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 5 > 733 - 743
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 10 > 1620 - 1631