- Jing Liu, Bo Yang:
Collusion-Resistant Multicast Key Distribution Based on Homomorphic One-Way Function Trees. IEEE Trans. Inf. Forensics Secur. 6(3-2): 980-991 (2011) - Daniel Luchaup, Randy Smith, Cristian Estan, Somesh Jha:
Speculative Parallel Pattern Matching. IEEE Trans. Inf. Forensics Secur. 6(2): 438-451 (2011) - Mehrdad Majzoobi, Farinaz Koushanfar
:
Time-Bounded Authentication of FPGAs. IEEE Trans. Inf. Forensics Secur. 6(3-2): 1123-1135 (2011) - Mani Malek Esmaeili, Mehrdad Fatourechi, Rabab Kreidieh Ward:
A Robust and Fast Video Copy Detection System Using Content-Based Fingerprinting. IEEE Trans. Inf. Forensics Secur. 6(1): 213-226 (2011) - Suhas Mathur, Wade Trappe:
BIT-TRAPS: Building Information-Theoretic Traffic Privacy Into Packet Streams. IEEE Trans. Inf. Forensics Secur. 6(3-1): 752-762 (2011) - Ehsan Nezhadarya, Z. Jane Wang, Rabab Kreidieh Ward:
Robust Image Watermarking Based on Multiscale Gradient Direction Quantization. IEEE Trans. Inf. Forensics Secur. 6(4): 1200-1213 (2011) - Kien Nguyen Thanh
, Clinton Fookes
, Sridha Sridharan, Simon Denman:
Quality-Driven Super-Resolution for Less Constrained Iris Recognition at a Distance and on the Move. IEEE Trans. Inf. Forensics Secur. 6(4): 1248-1258 (2011) - Koichiro Niinuma, Unsang Park, Anil K. Jain:
Erratum to "Soft Biometric Traits for Continuous User Authentication". IEEE Trans. Inf. Forensics Secur. 6(3-2): 1180 (2011) - Levent Özparlak, Ismail Avcibas:
Differentiating Between Images Using Wavelet-Based Transforms: A Comparative Study. IEEE Trans. Inf. Forensics Secur. 6(4): 1418-1431 (2011) - Unsang Park, Raghavender R. Jillela, Arun Ross, Anil K. Jain:
Periocular Biometrics in the Visible Spectrum. IEEE Trans. Inf. Forensics Secur. 6(1): 96-106 (2011) - Neal Patwari, Joey Wilson:
Spatial Models for Human Motion-Induced Signal Strength Variance on Static Links. IEEE Trans. Inf. Forensics Secur. 6(3-1): 791-802 (2011) - Saurabh U. Pawar, John F. Doherty:
Modulation Recognition in Continuous Phase Modulation Using Approximate Entropy. IEEE Trans. Inf. Forensics Secur. 6(3-1): 843-852 (2011) - Alexandre J. Pierrot
, Matthieu R. Bloch:
Strongly Secure Communications Over the Two-Way Wiretap Channel. IEEE Trans. Inf. Forensics Secur. 6(3-1): 595-605 (2011) - Vinay Uday Prabhu, Miguel R. D. Rodrigues:
On Wireless Channels With varepsilon-Outage Secrecy Capacity. IEEE Trans. Inf. Forensics Secur. 6(3-1): 853-860 (2011) - Hugo Proença
:
Quality Assessment of Degraded Iris Images Acquired in the Visible Wavelength. IEEE Trans. Inf. Forensics Secur. 6(1): 82-95 (2011) - Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar:
Secure Wireless Communication and Optimal Power Control Under Statistical Queueing Constraints. IEEE Trans. Inf. Forensics Secur. 6(3-1): 628-639 (2011) - Tu-Thach Quach:
Optimal Cover Estimation Methods and Steganographic Payload Location. IEEE Trans. Inf. Forensics Secur. 6(4): 1214-1222 (2011) - Alfredo Rial, Josep Balasch, Bart Preneel
:
A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer. IEEE Trans. Inf. Forensics Secur. 6(1): 202-212 (2011) - Arun Ross, Asem A. Othman:
Visual Cryptography for Biometric Privacy. IEEE Trans. Inf. Forensics Secur. 6(1): 70-81 (2011) - Shankar Sadasivam, Pierre Moulin, Todd P. Coleman
:
A Message-Passing Approach to Combating Desynchronization Attacks. IEEE Trans. Inf. Forensics Secur. 6(3-2): 894-905 (2011) - Sairul Izwan Safie
, John J. Soraghan, Lykourgos Petropoulakis:
Electrocardiogram (ECG) Biometric Authentication Using Pulse Active Ratio (PAR). IEEE Trans. Inf. Forensics Secur. 6(4): 1315-1322 (2011) - Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref, Jovan Dj. Golic:
Key Agreement Over Multiple Access Channel. IEEE Trans. Inf. Forensics Secur. 6(3-1): 775-790 (2011) - Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan
:
Secure Device Pairing Based on a Visual Channel: Design and Usability Study. IEEE Trans. Inf. Forensics Secur. 6(1): 28-38 (2011) - Hae Jong Seo, Peyman Milanfar:
Face Verification Using the LARK Representation. IEEE Trans. Inf. Forensics Secur. 6(4): 1275-1286 (2011) - Yan Shi, Michael A. Jensen:
Improved Radiometric Identification of Wireless Devices Using MIMO Transmission. IEEE Trans. Inf. Forensics Secur. 6(4): 1346-1354 (2011) - Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka:
Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems. IEEE Trans. Inf. Forensics Secur. 6(3-1): 650-660 (2011) - Shyong Jian Shyu, Ming Chiang Chen:
Optimum Pixel Expansions for Threshold Visual Secret Sharing Schemes. IEEE Trans. Inf. Forensics Secur. 6(3-2): 960-969 (2011) - Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik:
Tardos Fingerprinting Codes in the Combined Digit Model. IEEE Trans. Inf. Forensics Secur. 6(3-2): 906-919 (2011) - Ronald William Smith, George Scott Knight:
Predictable Three-Parameter Design of Network Covert Communication Systems. IEEE Trans. Inf. Forensics Secur. 6(1): 1-13 (2011) - Matthew C. Stamm, K. J. Ray Liu:
Anti-Forensics of Digital Image Compression. IEEE Trans. Inf. Forensics Secur. 6(3-2): 1050-1065 (2011)