IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 3 > 665 - 678
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 4 > 821 - 832
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 5 > 1092 - 1103
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 6 > 1299 - 1314
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 6 > 1250 - 1261
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 6 > 1109 - 1124
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 6 > 1167 - 1179
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1442 - 1455
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 8 > 1643 - 1655
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 9 > 1824 - 1834
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 9 > 1953 - 1966
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 10 > 2158 - 2170
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 10 > 2095 - 2107
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 10 > 2048 - 2056
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 11 > 2340 - 2351
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 11 > 2352 - 2364
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 12 > 2681 - 2691
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 12 > 2502 - 2514
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 12 > 2515 - 2530
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 59 - 73