IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 7 > 1141 - 1156
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 7 > 1098 - 1107
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 7 > 1157 - 1168
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 7 > 1133 - 1140
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 8 > 1227 - 1239
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 9 > 1356 - 1366
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 9 > 1406 - 1415
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 10 > 1557 - 1568
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 11 > 1893 - 1905
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 11 > 1883 - 1892
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 12 > 2302 - 2313
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 12 > 2327 - 2339
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 12 > 2193 - 2204
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 178 - 189
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 2 > 384 - 396
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 2 > 371 - 383
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 3 > 498 - 506
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 3 > 543 - 557
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 3 > 584 - 596
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 3 > 445 - 457