IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 1 > 1 - 13
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 1 > 46 - 54
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 1 > 14 - 23
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 1 > 24 - 30
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 2 > 174 - 180
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 2 > 254 - 266
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 2 > 227 - 239
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 2 > 240 - 253
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 2 > 283 - 289
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 2 > 127 - 139
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 2 > 188 - 197
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 2 > 198 - 212