Torrent Hash - Hash of all existing torrents
Please, pay attention to the fact that you are about to download the torrent NOT from torhash.net
torhash.net is just a torrent search engine, no torrents are hosted here.

Information Forensics and Security Journal - MYRIAD

Infohash:

D1B2DA8D34987F4D194234BD3FFFAA6B4C0E05F5

Type:

Other

Title:

Information Forensics and Security Journal - MYRIAD

Category:

Other/Other

Uploaded:

2010-01-29 (by myriadw)

Description:

................................................................................ . o oo o . . 0000 00 oooo oo0o oooo . . 00000 o00o0 oo0oo00000oo 00000000o oo000 000000o . . 00000 o00000o 000o00000000o o000000000o 00*000 *000000000o . . 00000 0000000o o00*000**0000o *0000000000* 000*00o 0000*00000o . . *0000oo0*00*000oooo00*0000o *000o ** 00o 000 000o 0000 *0000o . . 000000o*000*0000000* 000000oo000* 000 000000000o 0000 *000 . . 000*00* 000 *00000* *000000000* 000o o0000000000 0000 *000 . . 000 00 **000o 00000000 *000 *00**000000o 000 o00* . . 000 00 *00o 0000*0000o oo000 000 **000o 000ooo000000 . . 000o 00 000o 000 **000oo o0000000000o000 *000 00000000000* . . o000* 00o *000 000 *00000o00000000000000* *0 o000000** . . *00* *00 *00o 0000 *000000***00000000 ***** . . *0 000 *0*** *0* . . ** * . ................................................................................ IEEE Transactions on Information Forensics And Security - complete back issues MYRIAD WAREZ presents the complete back catalogue of this IEEE journal Roughly 250 papers on topics like electronic watermarking, fingerprint, iris and gait recognition, electronic voting, steganography/steganalysis, fingerprinting of digital cameras/cellphones, wiretapping and more... Essential reading for scientifically minded hackers, investigators, criminals, paranoids and cypherpunks. Now available for the 1st time without subscription! The full list of papers is in the file 'filelist' or just browse online at: http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10206 MYRIAD WAREZ is the world's foremost warez organization specialising in making mathematical research available to the wider community. Stay aware of our releases and projects at http://myriad.baywords.com/ or drop us a line at [email protected] /* */ if you want to help or just to request something you'd like to see us release.

Tags:

  1. myriad
  2. information security
  3. information forensics
  4. forensics
  5. research
  6. ieee
  7. t-ifs
  8. security research
  9. math
  10. math research
  11. information theory
  12. journal
  13. transactions on information fo

Files count:

271

Size:

372.52 Mb

Trackers:

udp://tracker.openbittorrent.com:80
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969

Files:

1. Transactions_on_Information_Forensics_and_Security/2006-1/A_Clustering_Based_Approach_to_Perceptual_Image_Hashing.pdf 779.56 Kb
2. Transactions_on_Information_Forensics_and_Security/2006-1/A_Markov_Chain_Monte_Carlo_Algorithm_for_Bayesian_Dynamic_Signature_Verificatio.pdf 824.74 Kb
3. Transactions_on_Information_Forensics_and_Security/2006-1/An_Accurate_Analysis_of_Scalar_Quantization-Based_Data_Hiding.pdf 339.82 Kb
4. Transactions_on_Information_Forensics_and_Security/2006-1/Analysis_and_Design_of_Secure_Watermark-Based_Authentication_Systems.pdf 477.18 Kb
5. Transactions_on_Information_Forensics_and_Security/2006-1/Approximate_Message_Authentication_Codes_for_N_-ary_Alphabets.pdf 1.24 Mb
6. Transactions_on_Information_Forensics_and_Security/2006-1/Automatic_Facial_Expression_Recognition_Using_Facial_Animation_Parameters_and_Mu.pdf 746.45 Kb
7. Transactions_on_Information_Forensics_and_Security/2006-1/Editorial_Introducing_T-IFS.pdf 140.86 Kb
8. Transactions_on_Information_Forensics_and_Security/2006-1/Personal_Authentication_Using_3-D_Finger_Geometry.pdf 804.65 Kb
9. Transactions_on_Information_Forensics_and_Security/2006-1/Steganalysis_Using_Higher-Order_Image_Statistics.pdf 1.33 Mb
10. Transactions_on_Information_Forensics_and_Security/2006-1/The_NTMAC_for_Authentication_of_Noisy_Messages.pdf 254.19 Kb
11. Transactions_on_Information_Forensics_and_Security/2006-1/Watermarking_Relying_on_Cover_Signal_Content_to_Hide_Synchronization_Marks.pdf 1.58 Mb
12. Transactions_on_Information_Forensics_and_Security/2006-1/Wet_Paper_Codes_With_Improved_Embedding_Efficiency.pdf 727.65 Kb
13. Transactions_on_Information_Forensics_and_Security/2006-2/An_Algorithm_for_Distorted_Fingerprint_Matching_Based_on_Local_Triangle_Feature_.pdf 2.08 Mb
14. Transactions_on_Information_Forensics_and_Security/2006-2/Biometrics_A_Tool_for_Information_Security.pdf 2.85 Mb
15. Transactions_on_Information_Forensics_and_Security/2006-2/Digital_Camera_Identification_From_Sensor_Pattern_Noise.pdf 1.02 Mb
16. Transactions_on_Information_Forensics_and_Security/2006-2/Efficient_Spatial_Image_Watermarking_via_New_Perceptual_Masking_and_Blind_Detec.pdf 3.32 Mb
17. Transactions_on_Information_Forensics_and_Security/2006-2/EyeCerts.pdf 1.95 Mb
18. Transactions_on_Information_Forensics_and_Security/2006-2/Joint_Coding_and_Embedding_Techniques_for_Multimedia_Fingerprinting.pdf 3.52 Mb
19. Transactions_on_Information_Forensics_and_Security/2006-2/Performance_Analysis_of_Iris-Based_Identification_System_at_the_Matching_Score_.pdf 1.87 Mb
20. Transactions_on_Information_Forensics_and_Security/2006-2/Reducing_Delay_and_Enhancing_DoS_Resistance_in_Multicast_Authentication_Through_.pdf 831.16 Kb
21. Transactions_on_Information_Forensics_and_Security/2006-2/Robust_and_Secure_Image_Hashing.pdf 1.64 Mb
22. Transactions_on_Information_Forensics_and_Security/2006-2/Steganalysis_for_Markov_Cover_Data_With_Applications_to_Images.pdf 1.26 Mb
23. Transactions_on_Information_Forensics_and_Security/2006-2/Teeth_Segmentation_in_Digitized_Dental_X-Ray_Films_Using_Mathematical_Morphology.pdf 5.11 Mb
24. Transactions_on_Information_Forensics_and_Security/2006-2/The_Boneh–Shaw_Fingerprinting_Scheme_is_Better_Than_We_Thought.pdf 235.50 Kb
25. Transactions_on_Information_Forensics_and_Security/2006-3/Behavior_Forensics_for_Scalable_Multiuser_Collusion_Fairness_Versus_Effectivenes.pdf 964.66 Kb
26. Transactions_on_Information_Forensics_and_Security/2006-3/Block_QIM_Watermarking_Games.pdf 869.22 Kb
27. Transactions_on_Information_Forensics_and_Security/2006-3/Correspondence.pdf 176.62 Kb
28. Transactions_on_Information_Forensics_and_Security/2006-3/Dual_Protection_of_JPEG_Images_Based_on_Informed_Embedding_and_Two-Stage_Waterma.pdf 1.51 Mb
29. Transactions_on_Information_Forensics_and_Security/2006-3/Estimation_of_Message_Source_and_Destination_From_Network_Intercepts.pdf 613.51 Kb
30. Transactions_on_Information_Forensics_and_Security/2006-3/Face_Identification_Using_Novel_Frequency-Domain_Representation_of_Facial_Asymm.pdf 1.16 Mb
31. Transactions_on_Information_Forensics_and_Security/2006-3/Fake_Finger_Detection_by_Skin_Distortion_Analysis.pdf 4.98 Mb
32. Transactions_on_Information_Forensics_and_Security/2006-3/Graphical_Passwords_Based_on_Robust_Discretization.pdf 159.04 Kb
33. Transactions_on_Information_Forensics_and_Security/2006-3/Gray_Hausdorff_Distance_Measure_for_Comparing_Face_Images.pdf 805.49 Kb
34. Transactions_on_Information_Forensics_and_Security/2006-3/Matrix_Embedding_for_Large_Payloads.pdf 300.72 Kb
35. Transactions_on_Information_Forensics_and_Security/2006-4/A_Set_Theoretic_Framework_for_Watermarking_and_Its_Application_to_Semifragile_Ta.pdf 6.55 Mb
36. Transactions_on_Information_Forensics_and_Security/2006-4/Correspondence.pdf 3.24 Mb
37. Transactions_on_Information_Forensics_and_Security/2006-4/Digital_Video_Steganalysis_Exploiting_Statistical_Visibility_in_the_Temporal_Dom.pdf 1.20 Mb
38. Transactions_on_Information_Forensics_and_Security/2006-4/Fingerprint_Retrieval_for_Identification.pdf 1.65 Mb
39. Transactions_on_Information_Forensics_and_Security/2006-4/Gaussian_Mixture_Modeling_of_Short-Time_Fourier_Transform_Features_for_Audio_Fin.pdf 421.90 Kb
40. Transactions_on_Information_Forensics_and_Security/2006-4/Multilevel_2-D_Bar_Codes_Toward_High-Capacity_Storage_Modules_for_Multimedia_Sec.pdf 1.93 Mb
41. Transactions_on_Information_Forensics_and_Security/2006-4/On_Fundamental_Limitations_of_Proving_Data_Theft.pdf 304.65 Kb
42. Transactions_on_Information_Forensics_and_Security/2006-4/Print_and_Scan_Resilient_Data_Hiding_in_Images.pdf 3.33 Mb
43. Transactions_on_Information_Forensics_and_Security/2006-4/Reversible_Steganography_for_VQ-Compressed_Images_Using_Side_Matching_and_Reloca.pdf 2.49 Mb
44. Transactions_on_Information_Forensics_and_Security/2006-4/Security_of_Lattice-Based_Data_Hiding_Against_the_Known_Message_Attack.pdf 1.02 Mb
45. Transactions_on_Information_Forensics_and_Security/2006-4/The_CRC–NTMAC_for_Noisy_Message_Authentication.pdf 447.70 Kb
46. Transactions_on_Information_Forensics_and_Security/2006-4/Traitor-Within-Traitor_Behavior_Forensics_Strategy_and_Risk_Minimization.pdf 1.43 Mb
47. Transactions_on_Information_Forensics_and_Security/2007-1/A_Framework_for_Robust_Watermarking_of_H.264-Encoded_Video_With_Controllable_Det.pdf 653.84 Kb
48. Transactions_on_Information_Forensics_and_Security/2007-1/A_New_Steganographic_Method_for_Data_Hiding_in_Microsoft_Word_Documents_by_a_Cha.pdf 503.83 Kb
49. Transactions_on_Information_Forensics_and_Security/2007-1/A_Parameter-Free_Framework_for_General_Supervised_Subspace_Learning.pdf 842.83 Kb
50. Transactions_on_Information_Forensics_and_Security/2007-1/Learning_Discriminant_Person-Specific_Facial_Models_Using_Expandable_Graphs.pdf 3.52 Mb
51. Transactions_on_Information_Forensics_and_Security/2007-1/Nonintrusive_Component_Forensics_of_Visual_Sensors_Using_Output_Images.pdf 1.11 Mb
52. Transactions_on_Information_Forensics_and_Security/2007-1/On_Generation_and_Analysis_of_Synthetic_Iris_Images.pdf 5.73 Mb
53. Transactions_on_Information_Forensics_and_Security/2007-1/Optimized_Feature_Extraction_for_Learning-Based_Image_Steganalysis.pdf 551.69 Kb
54. Transactions_on_Information_Forensics_and_Security/2007-1/Statistically_Robust_Detection_of_Multiplicative_Spread-Spectrum_Watermarks.pdf 902.20 Kb
55. Transactions_on_Information_Forensics_and_Security/2007-1/Steganalysis_of_Embedding_in_Two_Least-Significant_Bits.pdf 377.64 Kb
56. Transactions_on_Information_Forensics_and_Security/2007-2/A_Cascade_Framework_for_a_Real-Time_Statistical_Plate_Recognition_System.pdf 2.57 Mb
57. Transactions_on_Information_Forensics_and_Security/2007-2/A_Constructive_and_Unifying_Framework_for_Zero-Bit_Watermarking.pdf 838.94 Kb
58. Transactions_on_Information_Forensics_and_Security/2007-2/Analysis_and_Protection_of_Dynamic_Membership_Information_for_Group_Key_Distribu.pdf 981.43 Kb
59. Transactions_on_Information_Forensics_and_Security/2007-2/Correspondence.pdf 923.40 Kb
60. Transactions_on_Information_Forensics_and_Security/2007-2/Defense_Against_Injecting_Traffic_Attacks_in_Wireless_Mobile_Ad-Hoc_Networks.pdf 723.94 Kb
61. Transactions_on_Information_Forensics_and_Security/2007-2/Derivation_of_Error_Distribution_in_Least_Squares_Steganalysis.pdf 550.50 Kb
62. Transactions_on_Information_Forensics_and_Security/2007-2/Hand-Geometry_Recognition_Using_Entropy-Based_Discretization.pdf 784.10 Kb
63. Transactions_on_Information_Forensics_and_Security/2007-2/Human_Identification_From_Dental_X-Ray_Images_Based_on_the_Shape_and_Appearance.pdf 2.58 Mb
64. Transactions_on_Information_Forensics_and_Security/2007-2/Noniterative_Algorithms_for_Sensitivity_Analysis_Attacks.pdf 972.32 Kb
65. Transactions_on_Information_Forensics_and_Security/2007-2/Optical_Watermarking_for_Printed_Document_Authentication.pdf 573.44 Kb
66. Transactions_on_Information_Forensics_and_Security/2007-2/Performance_Analysis_of_Robust_Audio_Hashing.pdf 873.76 Kb
67. Transactions_on_Information_Forensics_and_Security/2007-2/Securing_Cooperative_Ad-Hoc_Networks_Under_Noise_and_Imperfect_Monitoring_Strate.pdf 819.59 Kb
68. Transactions_on_Information_Forensics_and_Security/2007-2/Tracing_Malicious_Relays_in_Cooperative_Wireless_Communications.pdf 1.21 Mb
69. Transactions_on_Information_Forensics_and_Security/2007-2/Using_Perceptual_Models_to_Improve_Fidelity_and_Provide_Resistance_to_Valumetric.pdf 3.37 Mb
70. Transactions_on_Information_Forensics_and_Security/2007-2/Using_Support_Vector_Machines_to_Enhance_the_Performance_of_Bayesian_Face_Recogn.pdf 348.22 Kb
71. Transactions_on_Information_Forensics_and_Security/2007-3-1/A_Memetic_Fingerprint_Matching_Algorithm.pdf 624.57 Kb
72. Transactions_on_Information_Forensics_and_Security/2007-3-1/Channel_Identification_Secret_Sharing_Using_Reciprocity_in_Ultrawideband_Channe.pdf 1.25 Mb
73. Transactions_on_Information_Forensics_and_Security/2007-3-1/Double-Sided_Watermark_Embedding_and_Detection.pdf 635.19 Kb
74. Transactions_on_Information_Forensics_and_Security/2007-3-1/Exposing_Digital_Forgeries_in_Complex_Lighting_Environments.pdf 1.54 Mb
75. Transactions_on_Information_Forensics_and_Security/2007-3-1/Exposing_Digital_Forgeries_in_Interlaced_and_Deinterlaced_Video.pdf 1.76 Mb
76. Transactions_on_Information_Forensics_and_Security/2007-3-1/Lossless_Data_Embedding_With_High_Embedding_Capacity_Based_on_Declustering_for_V.pdf 1.67 Mb
77. Transactions_on_Information_Forensics_and_Security/2007-3-1/Multimodal_Wireless_Networks_Communication_and_Surveillance_on_the_Same_Infrastr.pdf 911.99 Kb
78. Transactions_on_Information_Forensics_and_Security/2007-3-1/Reversible_Data-Hiding_Scheme_for_2-D_Vector_Maps_Based_on_Difference_Expansion.pdf 566.52 Kb
79. Transactions_on_Information_Forensics_and_Security/2007-3-1/Reversible_Image_Watermarking_Based_on_Integer-to-Integer_Wavelet_Transform.pdf 1.96 Mb
80. Transactions_on_Information_Forensics_and_Security/2007-3-1/Robust_Wireless_Transmission_of_Compressed_Latent_Fingerprint_Images.pdf 2.40 Mb
81. Transactions_on_Information_Forensics_and_Security/2007-3-1/Robust_and_Secure_Image_Hashing_via_Non-Negative_Matrix_Factorizations.pdf 3.38 Mb
82. Transactions_on_Information_Forensics_and_Security/2007-3-1/Statistical_Models_for_Assessing_the_Individuality_of_Fingerprints.pdf 2.09 Mb
83. Transactions_on_Information_Forensics_and_Security/2007-3-1/Toward_Pose-Invariant_2-D_Face_Recognition_Through_Point_Distribution_Models_and.pdf 2.68 Mb
84. Transactions_on_Information_Forensics_and_Security/2007-3-1/Unicity_Distance_of_Robust_Image_Hashing.pdf 473.81 Kb
85. Transactions_on_Information_Forensics_and_Security/2007-3-1/Warping-Based_Offline_Signature_Recognition.pdf 753.15 Kb
86. Transactions_on_Information_Forensics_and_Security/2007-3-1/Watermarking_Protocol_for_Web_Context.pdf 1.02 Mb
87. Transactions_on_Information_Forensics_and_Security/2007-3-2/3-D_Face_Recognition_Based_on_Warped_Example_Faces.pdf 2.10 Mb
88. Transactions_on_Information_Forensics_and_Security/2007-3-2/3-D_Face_Recognition_Using_Local_Appearance-Based_Models.pdf 1.01 Mb
89. Transactions_on_Information_Forensics_and_Security/2007-3-2/3-D_Face_Recognition_With_the_Geodesic_Polar_Representation.pdf 3.30 Mb
90. Transactions_on_Information_Forensics_and_Security/2007-3-2/A_Novel_Discriminant_Non-Negative_Matrix_Factorization_Algorithm_With_Applicatio.pdf 658.30 Kb
91. Transactions_on_Information_Forensics_and_Security/2007-3-2/An_Evaluation_of_Image_Sampling_and_Compression_for_Human_Iris_Recognition.pdf 1.49 Mb
92. Transactions_on_Information_Forensics_and_Security/2007-3-2/Biometric_Identification_Based_on_Frequency_Analysis_of_Cardiac_Sounds.pdf 426.01 Kb
93. Transactions_on_Information_Forensics_and_Security/2007-3-2/Class-Specific_Kernel-Discriminant_Analysis_for_Face_Verification.pdf 1.82 Mb
94. Transactions_on_Information_Forensics_and_Security/2007-3-2/Components_and_Their_Topology_for_Robust_Face_Detection_in_the_Presence_of_Parti.pdf 1.32 Mb
95. Transactions_on_Information_Forensics_and_Security/2007-3-2/Correspondence.pdf 701.74 Kb
96. Transactions_on_Information_Forensics_and_Security/2007-3-2/Face_Verification_Using_Template_Matching.pdf 849.46 Kb
97. Transactions_on_Information_Forensics_and_Security/2007-3-2/Guest_Editorial_Special_Issue_on_Human_Detection_and_Recognition.pdf 32.76 Kb
98. Transactions_on_Information_Forensics_and_Security/2007-3-2/Multiscale_Representation_for_3-D_Face_Recognition.pdf 845.66 Kb
99. Transactions_on_Information_Forensics_and_Security/2007-3-2/Palmprint_Classification_Using_Multiple_Advanced_Correlation_Filters_and_Palm-S.pdf 1.57 Mb
100. Transactions_on_Information_Forensics_and_Security/2007-3-2/Protecting_Biometric_Templates_With_Sketch_Theory_and_Practice.pdf 683.82 Kb
101. Transactions_on_Information_Forensics_and_Security/2007-3-2/Real-Time_Face_Detection_and_Motion_Analysis_With_Application_in_“Liveness”_.pdf 2.44 Mb
102. Transactions_on_Information_Forensics_and_Security/2007-3-2/Spoof_Attacks_on_Gait_Authentication_System.pdf 2.15 Mb
103. Transactions_on_Information_Forensics_and_Security/2007-4/A_Comparative_Study_of_Fingerprint_Image-Quality_Estimation_Methods.pdf 3.22 Mb
104. Transactions_on_Information_Forensics_and_Security/2007-4/A_New_Digital_Image_Watermarking_Algorithm_Resilient_to_Desynchronization_Attack.pdf 2.58 Mb
105. Transactions_on_Information_Forensics_and_Security/2007-4/A_Robust_Fingerprint_Indexing_Scheme_Using_Minutia_Neighborhood_Structure_and_Lo.pdf 744.43 Kb
106. Transactions_on_Information_Forensics_and_Security/2007-4/Application_of_Projective_Invariants_in_Hand_Geometry_Biometrics.pdf 890.09 Kb
107. Transactions_on_Information_Forensics_and_Security/2007-4/Collusion-Resistant_Video_Fingerprinting_for_Large_User_Group.pdf 1.59 Mb
108. Transactions_on_Information_Forensics_and_Security/2007-4/Combatting_Ambiguity_Attacks_via_Selective_Detection_of_Embedded_Watermarks.pdf 2.22 Mb
109. Transactions_on_Information_Forensics_and_Security/2007-4/Correction.pdf 35.20 Kb
110. Transactions_on_Information_Forensics_and_Security/2007-4/Decode-Time_Forensic_Watermarking_of_AAC_Bitstreams.pdf 1.38 Mb
111. Transactions_on_Information_Forensics_and_Security/2007-4/Detecting_Spoofing_and_Anomalous_Traffic_in_Wireless_Networks_via_Forge-Resist.pdf 1.32 Mb
112. Transactions_on_Information_Forensics_and_Security/2007-4/Fingerprint-Based_Fuzzy_Vault_Implementation_and_Performance.pdf 1.72 Mb
113. Transactions_on_Information_Forensics_and_Security/2007-4/Horizontal_and_Vertical_2DPCA-Based_Discriminant_Analysis_for_Face_Verification.pdf 1.61 Mb
114. Transactions_on_Information_Forensics_and_Security/2007-4/Noise_Reduction_in_Side_Channel_Attack_Using_Fourth-Order_Cumulant.pdf 809.54 Kb
115. Transactions_on_Information_Forensics_and_Security/2007-4/Optimum_Detection_for_Spread-Spectrum_Watermarking_That_Employs_Self-Masking.pdf 2.54 Mb
116. Transactions_on_Information_Forensics_and_Security/2007-4/Shape-Driven_Gabor_Jets_for_Face_Description_and_Authentication.pdf 1.95 Mb
117. Transactions_on_Information_Forensics_and_Security/2008-1/A_Region_Ensemble_for_3-D_Face_Recognition.pdf 2.56 Mb
118. Transactions_on_Information_Forensics_and_Security/2008-1/An_FPGA-Based_Network_Intrusion_Detection_Architecture.pdf 926.56 Kb
119. Transactions_on_Information_Forensics_and_Security/2008-1/Classification_and_Feature_Extraction_by_Simplexization.pdf 1.60 Mb
120. Transactions_on_Information_Forensics_and_Security/2008-1/Color_Image_Watermarking_Using_Multidimensional_Fourier_Transforms.pdf 1.45 Mb
121. Transactions_on_Information_Forensics_and_Security/2008-1/Determining_Image_Origin_and_Integrity_Using_Sensor_Noise.pdf 5.82 Mb
122. Transactions_on_Information_Forensics_and_Security/2008-1/Digital_Image_Forensics_via_Intrinsic_Fingerprints.pdf 1.77 Mb
123. Transactions_on_Information_Forensics_and_Security/2008-1/Effect_of_Severe_Image_Compression_on_Iris_Recognition_Performance.pdf 3.29 Mb
124. Transactions_on_Information_Forensics_and_Security/2008-1/Kerckhoffs-Based_Embedding_Security_Classes_for_WOA_Data_Hiding.pdf 609.37 Kb
125. Transactions_on_Information_Forensics_and_Security/2008-1/New_Additive_Watermark_Detectors_Based_On_A_Hierarchical_Spatially_Adaptive_Imag.pdf 855.37 Kb
126. Transactions_on_Information_Forensics_and_Security/2008-1/Physical-Layer_Authentication.pdf 693.71 Kb
127. Transactions_on_Information_Forensics_and_Security/2008-2/A_Fast_Search_Algorithm_for_a_Large_Fuzzy_Database.pdf 883.75 Kb
128. Transactions_on_Information_Forensics_and_Security/2008-2/An_Analysis_of_Lightweight_Encryption_Schemes_for_Fingerprint_Images.pdf 4.40 Mb
129. Transactions_on_Information_Forensics_and_Security/2008-2/Automatic_Construction_of_Dental_Charts_for_Postmortem_Identification.pdf 3.37 Mb
130. Transactions_on_Information_Forensics_and_Security/2008-2/Correspondence.pdf 1.60 Mb
131. Transactions_on_Information_Forensics_and_Security/2008-2/Detection_of_Double-Compression_in_JPEG_Images_for_Applications_in_Steganography.pdf 617.32 Kb
132. Transactions_on_Information_Forensics_and_Security/2008-2/Evaluation_of_Localization_Attacks_on_Power-Modulated_Challenge–Response_Syste.pdf 1.94 Mb
133. Transactions_on_Information_Forensics_and_Security/2008-2/Fusion_of_Matching_Algorithms_for_Human_Identification_Using_Dental_X-Ray_Radio.pdf 1.41 Mb
134. Transactions_on_Information_Forensics_and_Security/2008-2/Insertion_Deletion_Codes_With_Feature-Based_Embedding_A_New_Paradigm_for_Waterma.pdf 1.10 Mb
135. Transactions_on_Information_Forensics_and_Security/2008-2/Learning_the_Uncorrelated_Independent_and_Discriminating_Color_Spaces_for_Face_R.pdf 1.56 Mb
136. Transactions_on_Information_Forensics_and_Security/2008-2/Mutual_Information_Jammer-Relay_Games.pdf 839.62 Kb
137. Transactions_on_Information_Forensics_and_Security/2008-2/On_the_Distinguishability_of_Distance-Bounded_Permutations_in_Ordered_Channels.pdf 619.24 Kb
138. Transactions_on_Information_Forensics_and_Security/2008-2/On_the_Operational_Quality_of_Fingerprint_Scanners.pdf 2.81 Mb
139. Transactions_on_Information_Forensics_and_Security/2008-2/Quantization-Based_Data_Hiding_Robust_to_Linear-Time-Invariant_Filtering.pdf 997.09 Kb
140. Transactions_on_Information_Forensics_and_Security/2008-2/Secure_Cooperation_in_Autonomous_Mobile_Ad-Hoc_Networks_Under_Noise_and_Imperfec.pdf 1.13 Mb
141. Transactions_on_Information_Forensics_and_Security/2008-2/Secure_Interdomain_Routing_Registry.pdf 837.84 Kb
142. Transactions_on_Information_Forensics_and_Security/2008-2/Sensor_Data_Cryptography_in_Wireless_Sensor_Networks.pdf 1.27 Mb
143. Transactions_on_Information_Forensics_and_Security/2008-2/Template-Free_Biometric-Key_Generation_by_Means_of_Fuzzy_Genetic_Clustering.pdf 530.76 Kb
144. Transactions_on_Information_Forensics_and_Security/2008-3/A_Multimodal_Approach_for_Face_Modeling_and_Recognition.pdf 954.16 Kb
145. Transactions_on_Information_Forensics_and_Security/2008-3/A_Network_Coding_Approach_to_Secret_Key_Distribution.pdf 508.97 Kb
146. Transactions_on_Information_Forensics_and_Security/2008-3/A_Novel_Difference_Expansion_Transform_for_Reversible_Data_Embedding.pdf 1.23 Mb
147. Transactions_on_Information_Forensics_and_Security/2008-3/A_Selective_Feature_Information_Approach_for_Iris_Image-Quality_Measure.pdf 1.31 Mb
148. Transactions_on_Information_Forensics_and_Security/2008-3/A_Video_Watermarking_Scheme_Based_on_the_Dual-Tree_Complex_Wavelet_Transform.pdf 1.76 Mb
149. Transactions_on_Information_Forensics_and_Security/2008-3/Adaptive_Data_Hiding_in_Edge_Areas_of_Images_With_Spatial_LSB_Domain_Systems.pdf 1.30 Mb
150. Transactions_on_Information_Forensics_and_Security/2008-3/Bilinear_Models_for_3-D_Face_and_Facial_Expression_Recognition.pdf 1.64 Mb
151. Transactions_on_Information_Forensics_and_Security/2008-3/Blind_Authentication_Using_Periodic_Properties_of_Interpolation.pdf 2.85 Mb
152. Transactions_on_Information_Forensics_and_Security/2008-3/Blind_Identification_of_Source_Cell-Phone_Model.pdf 1.14 Mb
153. Transactions_on_Information_Forensics_and_Security/2008-3/Correspondence.pdf 541.20 Kb
154. Transactions_on_Information_Forensics_and_Security/2008-3/Data_Fusion_and_Cost_Minimization_for_Intrusion_Detection.pdf 427.56 Kb
155. Transactions_on_Information_Forensics_and_Security/2008-3/Digital_Single_Lens_Reflex_Camera_Identification_From_Traces_of_Sensor_Dust.pdf 1.49 Mb
156. Transactions_on_Information_Forensics_and_Security/2008-3/Digital_Video_Watermarking_in_P-Frames_With_Controlled_Video_Bit-Rate_Increase.pdf 841.34 Kb
157. Transactions_on_Information_Forensics_and_Security/2008-3/Distributed_Detection_of_Information_Flows.pdf 954.65 Kb
158. Transactions_on_Information_Forensics_and_Security/2008-3/Graphical_Inference_for_Multiple_Intrusion_Detection.pdf 478.41 Kb
159. Transactions_on_Information_Forensics_and_Security/2008-3/Guest_Editorial_Special_Section_on_Statistical_Methods_for_Network_Security_and_.pdf 25.35 Kb
160. Transactions_on_Information_Forensics_and_Security/2008-3/Lookup-Table-Based_Secure_Client-Side_Embedding_for_Spread-Spectrum_Watermarks.pdf 622.81 Kb
161. Transactions_on_Information_Forensics_and_Security/2008-3/Network_Security_for_Client-Server_Architecture_Using_Wiretap_Codes.pdf 553.93 Kb
162. Transactions_on_Information_Forensics_and_Security/2008-3/On_Empirical_Recognition_Capacity_of_Biometric_Systems_Under_Global_PCA_and_ICA_.pdf 2.50 Mb
163. Transactions_on_Information_Forensics_and_Security/2008-3/On_the_Assumptions_of_Equal_Contributions_in_Fingerprinting.pdf 173.73 Kb
164. Transactions_on_Information_Forensics_and_Security/2008-3/Projecting_Cyberattacks_Through_Variable-Length_Markov_Models.pdf 607.96 Kb
165. Transactions_on_Information_Forensics_and_Security/2008-3/Robust_Detection_of_MAC_Layer_Denial-of-Service_Attacks_in_CSMACA_Wireless_Netwo.pdf 704.29 Kb
166. Transactions_on_Information_Forensics_and_Security/2008-3/Special_Section_Correspondence.pdf 210.60 Kb
167. Transactions_on_Information_Forensics_and_Security/2008-4/3-D_Ear_Modeling_and_Recognition_From_Video_Sequences_Using_Shape_From_Shading.pdf 2.31 Mb
168. Transactions_on_Information_Forensics_and_Security/2008-4/A_Buyer–Seller_Watermarking_Protocol_Based_on_Secure_Embedding.pdf 103.02 Kb
169. Transactions_on_Information_Forensics_and_Security/2008-4/Chaotic-Type_Features_for_Speech_Steganalysis.pdf 1.61 Mb
170. Transactions_on_Information_Forensics_and_Security/2008-4/Correspondence.pdf 561.94 Kb
171. Transactions_on_Information_Forensics_and_Security/2008-4/Cryptographic_Secrecy_of_Steganographic_Matrix_Embedding.pdf 199.24 Kb
172. Transactions_on_Information_Forensics_and_Security/2008-4/Fingerprint-Quality_Index_Using_Gradient_Components.pdf 1.76 Mb
173. Transactions_on_Information_Forensics_and_Security/2008-4/Hiding_Traces_of_Resampling_in_Digital_Images.pdf 2.59 Mb
174. Transactions_on_Information_Forensics_and_Security/2008-4/Hierarchical_Watermarking_of_Semiregular_Meshes_Based_on_Wavelet_Transform.pdf 2.46 Mb
175. Transactions_on_Information_Forensics_and_Security/2008-4/Multiclass_Detector_of_Current_Steganographic_Methods_for_JPEG_Format.pdf 1.22 Mb
176. Transactions_on_Information_Forensics_and_Security/2008-4/Multipurpose_Watermarking_Based_on_Multiscale_Curvelet_Transform.pdf 733.10 Kb
177. Transactions_on_Information_Forensics_and_Security/2008-4/Recognizing_Rotated_Faces_From_Frontal_and_Side_Views_An_Approach_Toward_Effecti.pdf 3.27 Mb
178. Transactions_on_Information_Forensics_and_Security/2008-4/Regression_From_Uncertain_Labels_and_Its_Applications_to_Soft_Biometrics.pdf 1021.99 Kb
179. Transactions_on_Information_Forensics_and_Security/2008-4/Security_of_Lattice-Based_Data_Hiding_Against_the_Watermarked-Only_Attack.pdf 1.50 Mb
180. Transactions_on_Information_Forensics_and_Security/2008-4/Steganalysis_Frameworks_of_Embedding_in_Multiple_Least-Significant_Bits.pdf 728.97 Kb
181. Transactions_on_Information_Forensics_and_Security/2008-4/Subspace_Approximation_of_Face_Recognition_Algorithms_An_Empirical_Study.pdf 2.09 Mb
182. Transactions_on_Information_Forensics_and_Security/2008-4/Theoretical_and_Practical_Boundaries_of_Binary_Secure_Sketches.pdf 1007.34 Kb
183. Transactions_on_Information_Forensics_and_Security/2008-4/Toward_Compression_of_Encrypted_Images_and_Video_Sequences.pdf 2.06 Mb
184. Transactions_on_Information_Forensics_and_Security/2008-4/Use_of_Identification_Trial_Statistics_for_the_Combination_of_Biometric_Matcher.pdf 968.29 Kb
185. Transactions_on_Information_Forensics_and_Security/2008-4/Using_One-Class_SVMs_and_Wavelets_for_Audio_Surveillance.pdf 1.00 Mb
186. Transactions_on_Information_Forensics_and_Security/2009-1/Coding_Schemes_for_Relay-Assisted_Information_Embedding.pdf 887.02 Kb
187. Transactions_on_Information_Forensics_and_Security/2009-1/Correspondence.pdf 152.34 Kb
188. Transactions_on_Information_Forensics_and_Security/2009-1/Detection_of_Motion-Incoherent_Components_in_Video_Streams.pdf 664.34 Kb
189. Transactions_on_Information_Forensics_and_Security/2009-1/Editorial.pdf 154.14 Kb
190. Transactions_on_Information_Forensics_and_Security/2009-1/Exposing_Digital_Forgeries_from_JPEG_Ghosts.pdf 1.20 Mb
191. Transactions_on_Information_Forensics_and_Security/2009-1/Fingerprinting_With_Minimum_Distance_Decoding.pdf 790.11 Kb
192. Transactions_on_Information_Forensics_and_Security/2009-1/Hyperbolic_RDM_for_Nonlinear_Valumetric_Distortions.pdf 701.66 Kb
193. Transactions_on_Information_Forensics_and_Security/2009-1/Improving_Face_Recognition_via_Narrowband_Spectral_Range_Selection_Using_Jeffrey.pdf 3.39 Mb
194. Transactions_on_Information_Forensics_and_Security/2009-1/On_the_Implementation_of_the_Discrete_Fourier_Transform_in_the_Encrypted_Domain.pdf 612.72 Kb
195. Transactions_on_Information_Forensics_and_Security/2009-1/Personal_Authentication_Using_Finger_Knuckle_Surface.pdf 4.13 Mb
196. Transactions_on_Information_Forensics_and_Security/2009-1/Robust_Blind_Watermarking_of_Point-Sampled_Geometry.pdf 1.98 Mb
197. Transactions_on_Information_Forensics_and_Security/2009-1/SMOCK_A_Scalable_Method_of_Cryptographic_Key_Management_for_Mission-Critical_Wir.pdf 811.52 Kb
198. Transactions_on_Information_Forensics_and_Security/2009-1/Scanner_Identification_Using_Feature-Based_Processing_and_Analysis.pdf 2.92 Mb
199. Transactions_on_Information_Forensics_and_Security/2009-1/Spread-Spectrum_Watermarking_Security.pdf 1.11 Mb
200. Transactions_on_Information_Forensics_and_Security/2009-2/A_Game_Theoretical_Framework_on_Intrusion_Detection_in_Heterogeneous_Networks.pdf 399.11 Kb
201. Transactions_on_Information_Forensics_and_Security/2009-2/A_Graph_Approach_to_Quantitative_Analysis_of_Control-Flow_Obfuscating_Transforma.pdf 373.49 Kb
202. Transactions_on_Information_Forensics_and_Security/2009-2/A_Hypothesis_Testing_Approach_to_Semifragile_Watermark-Based_Authentication.pdf 876.04 Kb
203. Transactions_on_Information_Forensics_and_Security/2009-2/A_Parametric_Correlation_Framework_for_the_Statistical_Evaluation_and_Estimation.pdf 344.82 Kb
204. Transactions_on_Information_Forensics_and_Security/2009-2/Face_Recognition_Under_Occlusions_and_Variant_Expressions_With_Partial_Similarit.pdf 2.17 Mb
205. Transactions_on_Information_Forensics_and_Security/2009-2/Unseen_Visible_Watermarking_A_Novel_Methodology_for_Auxiliary_Information_Delive.pdf 1.88 Mb
206. Transactions_on_Information_Forensics_and_Security/2009-2/Watermarking_Robustness_Evaluation_Based_on_Perceptual_Quality_via_Genetic_Algor.pdf 1.37 Mb
207. Transactions_on_Information_Forensics_and_Security/2009-2/Wireless_Secrecy_in_Cellular_Systems_With_Infrastructure-Aided_Cooperation.pdf 1009.45 Kb
208. Transactions_on_Information_Forensics_and_Security/2009-3/A_Channel_Coding_Approach_for_Human_Authentication_From_Gait_Sequences.pdf 1004.28 Kb
209. Transactions_on_Information_Forensics_and_Security/2009-3/A_Sensing_Seat_for_Human_Authentication.pdf 1.20 Mb
210. Transactions_on_Information_Forensics_and_Security/2009-3/Adversary_Aware_Surveillance_Systems.pdf 858.86 Kb
211. Transactions_on_Information_Forensics_and_Security/2009-3/An_Information-Theoretic_View_of_Network-Aware_Malware_Attacks.pdf 824.22 Kb
212. Transactions_on_Information_Forensics_and_Security/2009-3/Channel-Based_Detection_of_Sybil_Attacks_in_Wireless_Networks.pdf 1.01 Mb
213. Transactions_on_Information_Forensics_and_Security/2009-3/Correspondence.pdf 188.92 Kb
214. Transactions_on_Information_Forensics_and_Security/2009-3/Digital_Image_Source_Coder_Forensics_Via_Intrinsic_Fingerprints.pdf 2.19 Mb
215. Transactions_on_Information_Forensics_and_Security/2009-3/Exploiting_the_Human–Machine_Gap_in_Image_Recognition_for_Designing_CAPTCHAs.pdf 2.11 Mb
216. Transactions_on_Information_Forensics_and_Security/2009-3/Fast_Algorithm_for_Updating_the_Discriminant_Vectors_of_Dual-Space_LDA.pdf 576.48 Kb
217. Transactions_on_Information_Forensics_and_Security/2009-3/Fast_Haar_Transform_Based_Feature_Extraction_for_Face_Representation_and_Recogni.pdf 1.63 Mb
218. Transactions_on_Information_Forensics_and_Security/2009-3/Fingerprint_Verification_Using_Spectral_Minutiae_Representations.pdf 4.05 Mb
219. Transactions_on_Information_Forensics_and_Security/2009-3/Fingerprinting_Compressed_Multimedia_Signals.pdf 2.78 Mb
220. Transactions_on_Information_Forensics_and_Security/2009-3/Halftone_Visual_Cryptography_Via_Error_Diffusion.pdf 9.70 Mb
221. Transactions_on_Information_Forensics_and_Security/2009-3/Improvement_in_Intrusion_Detection_With_Advances_in_Sensor_Fusion.pdf 390.79 Kb
222. Transactions_on_Information_Forensics_and_Security/2009-3/Intrinsic_Sensor_Noise_Features_for_Forensic_Analysis_on_Scanners_and_Scanned_Im.pdf 1.33 Mb
223. Transactions_on_Information_Forensics_and_Security/2009-3/Low-Complexity_Iris_Coding_and_Recognition_Based_on_Directionlets.pdf 1.31 Mb
224. Transactions_on_Information_Forensics_and_Security/2009-3/MPSteg-Color_Data_Hiding_Through_Redundant_Basis_Decomposition.pdf 1.68 Mb
225. Transactions_on_Information_Forensics_and_Security/2009-3/Mathematical_Model_for_Low-Rate_DoS_Attacks_Against_Application_Servers.pdf 817.87 Kb
226. Transactions_on_Information_Forensics_and_Security/2009-3/On_Estimation_Accuracy_of_Desynchronization_Attack_Channel_Parameters.pdf 775.82 Kb
227. Transactions_on_Information_Forensics_and_Security/2009-3/On_Reliability_and_Security_of_Randomized_Detectors_Against_Sensitivity_Analysis.pdf 583.63 Kb
228. Transactions_on_Information_Forensics_and_Security/2009-3/Performance_Analysis_of_Fridrich–Goljan_Self-Embedding_Authentication_Method.pdf 294.91 Kb
229. Transactions_on_Information_Forensics_and_Security/2009-3/Performance_of_Orthogonal_Fingerprinting_Codes_Under_Worst-Case_Noise.pdf 433.59 Kb
230. Transactions_on_Information_Forensics_and_Security/2009-3/Regular_Simplex_Fingerprints_and_Their_Optimality_Properties.pdf 556.72 Kb
231. Transactions_on_Information_Forensics_and_Security/2009-3/Robust_MC-CDMA-Based_Fingerprinting_Against_Time-Varying_Collusion_Attacks.pdf 1.25 Mb
232. Transactions_on_Information_Forensics_and_Security/2009-3/Steganalysis_of_YASS.pdf 806.45 Kb
233. Transactions_on_Information_Forensics_and_Security/2009-3/Temporal_Derivative-Based_Spectrum_and_Mel-Cepstrum_Audio_Steganalysis.pdf 1.37 Mb
234. Transactions_on_Information_Forensics_and_Security/2009-4-1/CAST_Canvass_Audits_by_Sampling_and_Testing.pdf 332.75 Kb
235. Transactions_on_Information_Forensics_and_Security/2009-4-1/Detecting_Code_Alteration_by_Creating_a_Temporary_Memory_Bottleneck.pdf 711.65 Kb
236. Transactions_on_Information_Forensics_and_Security/2009-4-1/Development_Formal_Verification_and_Evaluation_of_an_E-Voting_System_With_VVPAT.pdf 564.84 Kb
237. Transactions_on_Information_Forensics_and_Security/2009-4-1/Enhancing_Electronic_Voting_Machines_on_the_Example_of_Bingo_Voting.pdf 124.39 Kb
238. Transactions_on_Information_Forensics_and_Security/2009-4-1/Guest_Editorial_Special_Issue_on_Electronic_Voting.pdf 1.19 Mb
239. Transactions_on_Information_Forensics_and_Security/2009-4-1/Prêt_à_Voter_a_Voter-Verifiable_Voting_System.pdf 605.39 Kb
240. Transactions_on_Information_Forensics_and_Security/2009-4-1/Scantegrity_II_End-to-End_Verifiability_by_Voters_of_Optical_Scan_Elections_Thr.pdf 1.15 Mb
241. Transactions_on_Information_Forensics_and_Security/2009-4-1/Security_in_Large-Scale_Internet_Elections_A_Retrospective_Analysis_of_Elections.pdf 1.50 Mb
242. Transactions_on_Information_Forensics_and_Security/2009-4-1/Shuffle-Sum_Coercion-Resistant_Verifiable_Tallying_for_STV_Voting.pdf 463.92 Kb
243. Transactions_on_Information_Forensics_and_Security/2009-4-1/State-Wide_Elections_Optical_Scan_Voting_Systems_and_the_Pursuit_of_Integrity.pdf 1.15 Mb
244. Transactions_on_Information_Forensics_and_Security/2009-4-1/Straight-Party_Voting_What_Do_Voters_Think?.pdf 2.54 Mb
245. Transactions_on_Information_Forensics_and_Security/2009-4-1/TPM_Meets_DRE_Reducing_the_Trust_Base_for_Electronic_Voting_Using_Trusted_Platfo.pdf 534.71 Kb
246. Transactions_on_Information_Forensics_and_Security/2009-4-1/The_Effectiveness_of_Receipt-Based_Attacks_on_ThreeBallot.pdf 531.55 Kb
247. Transactions_on_Information_Forensics_and_Security/2009-4-1/Voting_With_Unconditional_Privacy_by_Merging_Prêt_à_Voter_and_PunchScan.pdf 411.88 Kb
248. Transactions_on_Information_Forensics_and_Security/2009-4-2/A_Study_on_the_Randomness_Measure_of_Image_Hashing.pdf 393.80 Kb
249. Transactions_on_Information_Forensics_and_Security/2009-4-2/Accurate_Detection_of_Demosaicing_Regularity_for_Digital_Image_Forensics.pdf 1.25 Mb
250. Transactions_on_Information_Forensics_and_Security/2009-4-2/Behavior_Forensics_With_Side_Information_for_Multimedia_Fingerprinting_Social_Ne.pdf 1.50 Mb
251. Transactions_on_Information_Forensics_and_Security/2009-4-2/Benchmarking_Quality-Dependent_and_Cost-Sensitive_Score-Level_Multimodal_Biometr.pdf 1.90 Mb
252. Transactions_on_Information_Forensics_and_Security/2009-4-2/Biometric_Systems_Privacy_and_Secrecy_Aspects.pdf 887.76 Kb
253. Transactions_on_Information_Forensics_and_Security/2009-4-2/Election_Audits_Using_a_Trinomial_Bound.pdf 234.92 Kb
254. Transactions_on_Information_Forensics_and_Security/2009-4-2/Free_Electronic_Access_to_SP_Publications.pdf 21.28 Kb
255. Transactions_on_Information_Forensics_and_Security/2009-4-2/High-Rate_Random-Like_Spherical_Fingerprinting_Codes_With_Linear_Decoding_Comple.pdf 526.18 Kb
256. Transactions_on_Information_Forensics_and_Security/2009-4-2/Iris_Recognition_Using_Signal-Level_Fusion_of_Frames_From_Video.pdf 2.30 Mb
257. Transactions_on_Information_Forensics_and_Security/2009-4-2/Iris_Segmentation_Using_Geodesic_Active_Contours.pdf 3.75 Mb
258. Transactions_on_Information_Forensics_and_Security/2009-4-2/Joint_Watermarking_Scheme_for_Multiparty_Multilevel_DRM_Architecture.pdf 1.81 Mb
259. Transactions_on_Information_Forensics_and_Security/2009-4-2/Multibiometric_Cryptosystem_Model_Structure_and_Performance_Analysis.pdf 1017.20 Kb
260. Transactions_on_Information_Forensics_and_Security/2009-4-2/Noninteractive_Self-Certification_for_Long-Lived_Mobile_Ad_Hoc_Networks.pdf 589.52 Kb
261. Transactions_on_Information_Forensics_and_Security/2009-4-2/On_the_Security_of_the_Secure_Arithmetic_Code.pdf 2.12 Mb
262. Transactions_on_Information_Forensics_and_Security/2009-4-2/Pairwise_Boosted_Audio_Fingerprint.pdf 1.47 Mb
263. Transactions_on_Information_Forensics_and_Security/2009-4-2/Parallelizing_Iris_Recognition.pdf 1.31 Mb
264. Transactions_on_Information_Forensics_and_Security/2009-4-2/Provably_Secure_Remote_Truly_Three-Factor_Authentication_Scheme_With_Privacy_Pro.pdf 574.39 Kb
265. Transactions_on_Information_Forensics_and_Security/2009-4-2/Quantum_Hashing_for_Multimedia.pdf 831.43 Kb
266. Transactions_on_Information_Forensics_and_Security/2009-4-2/Risk-Limiting_Postelection_Audits_Conservative_P_-Values_From_Common_Probability.pdf 349.21 Kb
267. Transactions_on_Information_Forensics_and_Security/2009-4-2/Robust_Orientation_Field_Estimation_and_Extrapolation_Using_Semilocal_Line_Senso.pdf 2.00 Mb
268. Transactions_on_Information_Forensics_and_Security/2009-4-2/Securing_Rating_Aggregation_Systems_Using_Statistical_Detectors_and_Trust.pdf 2.04 Mb
269. Transactions_on_Information_Forensics_and_Security/2009-4-2/Self-Verifying_Visual_Secret_Sharing_Using_Error_Diffusion_and_Interpolation_Tec.pdf 2.04 Mb
270. Transactions_on_Information_Forensics_and_Security/filelist 19.90 Kb
271. Transactions_on_Information_Forensics_and_Security/myriad.NFO 2.32 Kb