IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 2 > 452 - 468
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 523 - 531
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 737 - 751
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 541 - 550
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 551 - 564
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 616 - 627
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 763 - 774
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1370 - 1381
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1185 - 1199
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 1-2 > 310 - 320
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 480 - 490
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 651 - 663
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 798 - 808
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 833 - 841
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 465 - 479
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 3 > 1040 - 1052
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 5 > 1638 - 1651
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 5 > 1628 - 1637
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 5 > 1472 - 1483
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 6 > 1752 - 1765