IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 2 > 373 - 387
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 3 > 642 - 657
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 3 > 658 - 659
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 980 - 992
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 907 - 921
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 6 > 1362 - 1375
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 6 > 1346 - 1361
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 6 > 1177 - 1191
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 6 > 1165 - 1176
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 7 > 1618 - 1629
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 7 > 1565 - 1577
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 8 > 1661 - 1673
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 8 > 1712 - 1721
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 8 > 1796 - 1806
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 8 > 1771 - 1779
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 9 > 2052 - 2064
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 9 > 1956 - 1969
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 11 > 2401 - 2414
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 11 > 2584 - 2593
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 11 > 2513 - 2527