- Willie K. Harrison, João Almeida, Steven W. McLaughlin, João Barros:
Coding for Cryptographic Security Enhancement Using Stopping Sets. IEEE Trans. Inf. Forensics Secur. 6(3-1): 575-584 (2011) - Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Jianying Zhou, Robert H. Deng:
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures. IEEE Trans. Inf. Forensics Secur. 6(2): 498-512 (2011) - Yongfeng Huang, Shanyu Tang, Jian Yuan:
Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec. IEEE Trans. Inf. Forensics Secur. 6(2): 296-306 (2011) - Qiong Huang, Duncan S. Wong, Willy Susilo:
Efficient Designated Confirmer Signature and DCS-Based Ambiguous Optimistic Fair Exchange. IEEE Trans. Inf. Forensics Secur. 6(4): 1233-1247 (2011) - Motohiko Isaka, Seiya Kawata:
Signal Sets for Secret Key Agreement With Public Discussion Based on Gaussian and Fading Channels. IEEE Trans. Inf. Forensics Secur. 6(3-1): 523-531 (2011) - Sina Jahanbin, Hyohoon Choi, Alan C. Bovik:
Passive Multimodal 2-D+3-D Face Recognition Using Gabor Features and Landmark Distances. IEEE Trans. Inf. Forensics Secur. 6(4): 1287-1304 (2011) - Hyoungsuk Jeon, Daesung Hwang, Jinho Choi, Hyuckjae Lee, Jeongseok Ha:
Secure Type-Based Multiple Access. IEEE Trans. Inf. Forensics Secur. 6(3-1): 763-774 (2011) - Vivek Kanhangad, Ajay Kumar, David Zhang:
A Unified Framework for Contactless Hand Verification. IEEE Trans. Inf. Forensics Secur. 6(3-2): 1014-1027 (2011) - Raj S. Katti, Sudarshan K. Srinivasan, Aida Vosoughi:
On the Security of Randomized Arithmetic Codes Against Ciphertext-Only Attacks. IEEE Trans. Inf. Forensics Secur. 6(1): 19-27 (2011) - Eric Kee, Micah K. Johnson, Hany Farid:
Digital Image Authentication From JPEG Headers. IEEE Trans. Inf. Forensics Secur. 6(3-2): 1066-1075 (2011) - Emile J. C. Kelkboom, Jeroen Breebaart, Tom A. M. Kevenaar, Ileana Buhan, Raymond N. J. Veldhuis:
Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme. IEEE Trans. Inf. Forensics Secur. 6(1): 107-121 (2011) - Ashish Khisti, Suhas N. Diggavi, Gregory W. Wornell:
Secret-Key Agreement With Channel State Information at the Transmitter. IEEE Trans. Inf. Forensics Secur. 6(3-1): 672-681 (2011) - Demijan Klinc, Jeongseok Ha, Steven W. McLaughlin, João Barros, Byung-Jae Kwak:
LDPC Codes for the Gaussian Wiretap Channel. IEEE Trans. Inf. Forensics Secur. 6(3-1): 532-540 (2011) - Mari Kobayashi, Pablo Piantanida, Sheng Yang, Shlomo Shamai:
On the Secrecy Degrees of Freedom of the Multiantenna Block Fading Wiretap Channels. IEEE Trans. Inf. Forensics Secur. 6(3-1): 703-711 (2011) - Farinaz Koushanfar, Azalia Mirhoseini:
A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection. IEEE Trans. Inf. Forensics Secur. 6(1): 162-174 (2011) - Lifeng Lai, Siu-Wai Ho, H. Vincent Poor:
Privacy-Security Trade-Offs in Biometric Security Systems - Part I: Single Use Case. IEEE Trans. Inf. Forensics Secur. 6(1): 122-139 (2011) - Lifeng Lai, Siu-Wai Ho, H. Vincent Poor:
Privacy-Security Trade-Offs in Biometric Security Systems - Part II: Multiple Use Case. IEEE Trans. Inf. Forensics Secur. 6(1): 140-151 (2011) - I-Jen Lai, Wen-Hsiang Tsai:
Secret-Fragment-Visible Mosaic Image-A New Computer Art and Its Application to Information Hiding. IEEE Trans. Inf. Forensics Secur. 6(3-2): 936-945 (2011) - Charles Lamech, Reza M. Rad, Mohammad Tehranipoor, Jim Plusquellic:
An Experimental Analysis of Power and Delay Signal-to-Noise Requirements for Detecting Trojans and Methods for Achieving the Required Detection Sensitivities. IEEE Trans. Inf. Forensics Secur. 6(3-2): 1170-1179 (2011) - Lei Jiang, Zhu Han, Maria Angeles Vázquez-Castro, Are Hjørungnes:
Secure Satellite Communication Systems Design With Individual Secrecy Rate Constraints. IEEE Trans. Inf. Forensics Secur. 6(3-1): 661-671 (2011) - Ka-Chung Leung, Cheung Hoi Leung:
Improvement of Fingerprint Retrieval by a Statistical Classifier. IEEE Trans. Inf. Forensics Secur. 6(1): 59-69 (2011) - Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson:
Towards Situational Awareness of Large-Scale Botnet Probing Events. IEEE Trans. Inf. Forensics Secur. 6(1): 175-188 (2011) - Jiangyuan Li, Athina P. Petropulu:
Ergodic Secrecy Rate for Multiple-Antenna Wiretap Channels With Rician Fading. IEEE Trans. Inf. Forensics Secur. 6(3-1): 861-867 (2011) - Zhifeng Li, Unsang Park, Anil K. Jain:
A Discriminative Model for Age Invariant Face Recognition. IEEE Trans. Inf. Forensics Secur. 6(3-2): 1028-1037 (2011) - Jinku Li, Zhi Wang, Tyler K. Bletsch, Deepa Srinivasan, Michael C. Grace, Xuxian Jiang:
Comprehensive and Efficient Protection of Kernel Control Data. IEEE Trans. Inf. Forensics Secur. 6(4): 1404-1417 (2011) - Yingbin Liang, H. Vincent Poor, Lei Ying:
Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization. IEEE Trans. Inf. Forensics Secur. 6(3-1): 682-692 (2011) - Daw-Tung Lin, Kai-Yung Huang:
Collaborative Pedestrian Tracking and Data Fusion With Multiple Cameras. IEEE Trans. Inf. Forensics Secur. 6(4): 1432-1444 (2011) - Qiguang Liu, Xiaochun Cao, Chao Deng, Xiaojie Guo:
Identifying Image Composites Through Shadow Matte Consistency. IEEE Trans. Inf. Forensics Secur. 6(3-2): 1111-1122 (2011) - Ming-Wei Liu, John F. Doherty:
Nonlinearity Estimation for Specific Emitter Identification in Multipath Channels. IEEE Trans. Inf. Forensics Secur. 6(3-2): 1076-1085 (2011) - Feng Liu, Chuankun Wu:
Embedded Extended Visual Cryptography Schemes. IEEE Trans. Inf. Forensics Secur. 6(2): 307-322 (2011)