IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 12 > 1975 - 1985
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 3 > 364 - 374
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 3 > 464 - 475
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 5 > 851 - 862
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 2 > 278 - 292
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 4 > 736 - 745
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 4 > 746 - 761
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 5 > 916 - 931
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 5 > 953 - 968
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1359 - 1370
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 8 > 1549 - 1563
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 8 > 1590 - 1602
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 8 > 1705 - 1716
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 10 > 2084 - 2094
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 200 - 214
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 2 > 235 - 246
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 2 > 328 - 343
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 3 > 571 - 583
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 4 > 720 - 733
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 7 > 1618 - 1629