Search dblp for Publications

export results for "toc:db/journals/tifs/tifs10.bht:"

 download as .bib file

@article{DBLP:journals/tifs/0001J15,
  author       = {Kai Cao and
                  Anil K. Jain},
  title        = {Learning Fingerprint Reconstruction: From Minutiae to Image},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {104--117},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2363951},
  doi          = {10.1109/TIFS.2014.2363951},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/0001J15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0003LLMP15,
  author       = {Liang Xiao and
                  Jinliang Liu and
                  Qiangda Li and
                  Narayan B. Mandayam and
                  H. Vincent Poor},
  title        = {User-Centric View of Jamming Games in Cognitive Radio Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2578--2590},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2467593},
  doi          = {10.1109/TIFS.2015.2467593},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/0003LLMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlahmadiFSL15,
  author       = {Ahmed Alahmadi and
                  Zhaoxi Fang and
                  Tianlong Song and
                  Tongtong Li},
  title        = {Subband {PUEA} Detection and Mitigation in OFDM-Based Cognitive Radio
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2131--2142},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2450673},
  doi          = {10.1109/TIFS.2015.2450673},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlahmadiFSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlipourASH15,
  author       = {Hamid Reza Alipour and
                  Youssif B. Al{-}Nashif and
                  Pratik Satam and
                  Salim Hariri},
  title        = {Wireless Anomaly Detection Based on {IEEE} 802.11 Behavior Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2158--2170},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2433898},
  doi          = {10.1109/TIFS.2015.2433898},
  timestamp    = {Fri, 03 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlipourASH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlvarezICDC15,
  author       = {B. Rosario Campomanes{-}{\'{A}}lvarez and
                  {\'{O}}scar Ib{\'{a}}{\~{n}}ez and
                  Carmen Campomanes{-}{\'{A}}lvarez and
                  Sergio Damas and
                  Oscar Cord{\'{o}}n},
  title        = {Modeling Facial Soft Tissue Thickness for Automatic Skull-Face Overlay},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2057--2070},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2441000},
  doi          = {10.1109/TIFS.2015.2441000},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlvarezICDC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlzaabiTM15,
  author       = {Mohammed Alzaabi and
                  Kamal Taha and
                  Thomas Anthony Martin},
  title        = {{CISRI:} {A} Crime Investigation System Using the Relative Importance
                  of Information Spreaders in Networks Depicting Criminals Communications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2196--2211},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2451073},
  doi          = {10.1109/TIFS.2015.2451073},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlzaabiTM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AmuruB15,
  author       = {SaiDhiraj Amuru and
                  R. Michael Buehrer},
  title        = {Optimal Jamming Against Digital Modulation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2212--2224},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2451081},
  doi          = {10.1109/TIFS.2015.2451081},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AmuruB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AnwarA15,
  author       = {Tarique Anwar and
                  Muhammad Abulaish},
  title        = {Ranking Radically Influential Web Forum Users},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1289--1298},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2407313},
  doi          = {10.1109/TIFS.2015.2407313},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AnwarA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ArashlooKC15,
  author       = {Shervin Rahimzadeh Arashloo and
                  Josef Kittler and
                  William J. Christmas},
  title        = {Face Spoofing Detection Based on Multiple Descriptor Fusion Using
                  Multiscale Dynamic Binarized Statistical Image Features},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2396--2407},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2458700},
  doi          = {10.1109/TIFS.2015.2458700},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ArashlooKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ArdizzoneBM15,
  author       = {Edoardo Ardizzone and
                  Alessandro Bruno and
                  Giuseppe Mazzola},
  title        = {Copy-Move Forgery Detection by Matching Triangles of Keypoints},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2084--2094},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2445742},
  doi          = {10.1109/TIFS.2015.2445742},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ArdizzoneBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AsgharSLKP15,
  author       = {Hassan Jameel Asghar and
                  Ron Steinfeld and
                  Shujun Li and
                  Mohamed Ali K{\^{a}}afar and
                  Josef Pieprzyk},
  title        = {On the Linearization of Human Identification Protocols: Attacks Based
                  on Linear Algebra, Coding Theory, and Lattices},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1643--1655},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2421875},
  doi          = {10.1109/TIFS.2015.2421875},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AsgharSLKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BahramiKLL15,
  author       = {Khosro Bahrami and
                  Alex ChiChung Kot and
                  Leida Li and
                  Haoliang Li},
  title        = {Blurred Image Splicing Localization by Exposing Blur Type Inconsistency},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {5},
  pages        = {999--1009},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2394231},
  doi          = {10.1109/TIFS.2015.2394231},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BahramiKLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BansodRP15,
  author       = {Gaurav Bansod and
                  Nishchal Raval and
                  Narayan Pisharoty},
  title        = {Implementation of a New Lightweight Encryption Design for Embedded
                  Security},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {142--151},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2365734},
  doi          = {10.1109/TIFS.2014.2365734},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BansodRP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BarsoumH15,
  author       = {Ayad F. Barsoum and
                  M. Anwar Hasan},
  title        = {Provable Multicopy Dynamic Data Possession in Cloud Computing Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {485--497},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2384391},
  doi          = {10.1109/TIFS.2014.2384391},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BarsoumH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BaturonePE15,
  author       = {Iluminada Baturone and
                  Miguel A. Prada{-}Delgado and
                  Susana Eiroa},
  title        = {Improved Generation of Identifiers, Secret Keys, and Random Numbers
                  From SRAMs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2653--2668},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2471279},
  doi          = {10.1109/TIFS.2015.2471279},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BaturonePE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BayramSM15,
  author       = {Sevinc Bayram and
                  Husrev Taha Sencar and
                  Nasir D. Memon},
  title        = {Sensor Fingerprint Identification Through Composite Fingerprints and
                  Group Testing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {597--612},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2385634},
  doi          = {10.1109/TIFS.2014.2385634},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/BayramSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BocheSP15,
  author       = {Holger Boche and
                  Rafael F. Schaefer and
                  H. Vincent Poor},
  title        = {On the Continuity of the Secrecy Capacity of Compound and Arbitrarily
                  Varying Wiretap Channels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2531--2546},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2465937},
  doi          = {10.1109/TIFS.2015.2465937},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BocheSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BorleCD15,
  author       = {Kapil M. Borle and
                  Biao Chen and
                  Wenliang Du},
  title        = {Physical Layer Spectrum Usage Authentication in Cognitive Radio: Analysis
                  and Implementation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2225--2235},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2452893},
  doi          = {10.1109/TIFS.2015.2452893},
  timestamp    = {Mon, 29 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BorleCD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CS15,
  author       = {Haris B. C. and
                  Rohit Sinha},
  title        = {Robust Speaker Verification With Joint Sparse Coding Over Learned
                  Dictionaries},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2143--2157},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2450674},
  doi          = {10.1109/TIFS.2015.2450674},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CagaljPB15,
  author       = {Mario Cagalj and
                  Toni Perkovic and
                  Marin Bugaric},
  title        = {Timing Attacks on Cognitive Authentication Schemes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {584--596},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2376177},
  doi          = {10.1109/TIFS.2014.2376177},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/CagaljPB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CambareriMPRS15,
  author       = {Valerio Cambareri and
                  Mauro Mangia and
                  Fabio Pareschi and
                  Riccardo Rovatti and
                  Gianluca Setti},
  title        = {On Known-Plaintext Attacks to a Compressed Sensing-Based Encryption:
                  {A} Quantitative Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2182--2195},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2450676},
  doi          = {10.1109/TIFS.2015.2450676},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CambareriMPRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenGXC15,
  author       = {Gaojie Chen and
                  Yu Gong and
                  Pei Xiao and
                  Jonathon A. Chambers},
  title        = {Physical Layer Network Security in the Full-Duplex Relay System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {574--583},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2390136},
  doi          = {10.1109/TIFS.2015.2390136},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenGXC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenHLMLW15,
  author       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jin Li and
                  Jianfeng Ma and
                  Wenjing Lou and
                  Duncan S. Wong},
  title        = {New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear
                  Equations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {69--78},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2363765},
  doi          = {10.1109/TIFS.2014.2363765},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenHLMLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenMYG15,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Fuchun Guo},
  title        = {{BL-MLE:} Block-Level Message-Locked Encryption for Secure Large File
                  Deduplication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2643--2652},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2470221},
  doi          = {10.1109/TIFS.2015.2470221},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenMYG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenNS15,
  author       = {Kan Chen and
                  Balasubramaniam Natarajan and
                  Steve Shattil},
  title        = {Secret Key Generation Rate With Power Allocation in Relay-Based {LTE-A}
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2424--2434},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2462756},
  doi          = {10.1109/TIFS.2015.2462756},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenPZM15,
  author       = {Shaxun Chen and
                  Amit Pande and
                  Kai Zeng and
                  Prasant Mohapatra},
  title        = {Live Video Forensics: Source Identification in Lossy Wireless Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {28--39},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2362848},
  doi          = {10.1109/TIFS.2014.2362848},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenPZM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CheonK15,
  author       = {Jung Hee Cheon and
                  Jinsu Kim},
  title        = {A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic
                  Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {5},
  pages        = {1052--1063},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2398359},
  doi          = {10.1109/TIFS.2015.2398359},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CheonK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChingovskaA15,
  author       = {Ivana Chingovska and
                  Andr{\'{e}} Rabello dos Anjos},
  title        = {On the Use of Client Identity Information for Face Antispoofing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {4},
  pages        = {787--796},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2400392},
  doi          = {10.1109/TIFS.2015.2400392},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChingovskaA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChuSL15,
  author       = {Xiaoyu Chu and
                  Matthew Christopher Stamm and
                  K. J. Ray Liu},
  title        = {Compressive Sensing Forensics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {7},
  pages        = {1416--1431},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2413389},
  doi          = {10.1109/TIFS.2015.2413389},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChuSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CogranneF15,
  author       = {R{\'{e}}mi Cogranne and
                  Jessica J. Fridrich},
  title        = {Modeling and Extending the Ensemble Classifier for Steganalysis of
                  Digital Images Using Hypothesis Testing Theory},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2627--2642},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2470220},
  doi          = {10.1109/TIFS.2015.2470220},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CogranneF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ConotterAP15,
  author       = {Valentina Conotter and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Forensic Detection of Processing Operator Chains: Recovering the History
                  of Filtered {JPEG} Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2257--2269},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2424195},
  doi          = {10.1109/TIFS.2015.2424195},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ConotterAP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CozzolinoPV15,
  author       = {Davide Cozzolino and
                  Giovanni Poggi and
                  Luisa Verdoliva},
  title        = {Efficient Dense-Field Copy-Move Forgery Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2284--2297},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2455334},
  doi          = {10.1109/TIFS.2015.2455334},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CozzolinoPV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CuiQZ15,
  author       = {Aijiao Cui and
                  Gang Qu and
                  Yan Zhang},
  title        = {Ultra-Low Overhead Dynamic Watermarking on Scan Design for Hard {IP}
                  Protection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2298--2313},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2455338},
  doi          = {10.1109/TIFS.2015.2455338},
  timestamp    = {Tue, 14 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/CuiQZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Czajka15,
  author       = {Adam Czajka},
  title        = {Pupil Dynamics for Iris Liveness Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {4},
  pages        = {726--735},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2398815},
  doi          = {10.1109/TIFS.2015.2398815},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Czajka15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DaiM15,
  author       = {Bin Dai and
                  Zheng Ma},
  title        = {Multiple-Access Relay Wiretap Channel},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {1835--1849},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2431992},
  doi          = {10.1109/TIFS.2015.2431992},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DaiM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Dang-NguyenBN15,
  author       = {Duc{-}Tien Dang{-}Nguyen and
                  Giulia Boato and
                  Francesco G. B. De Natale},
  title        = {3D-Model-Based Video Analysis for Computer Generated Faces Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1752--1763},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2427778},
  doi          = {10.1109/TIFS.2015.2427778},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Dang-NguyenBN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DengWGW15,
  author       = {Hao Deng and
                  Huiming Wang and
                  Wei Guo and
                  Wenjie Wang},
  title        = {Secrecy Transmission With a Helper: To Relay or to Jam},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {293--307},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2374356},
  doi          = {10.1109/TIFS.2014.2374356},
  timestamp    = {Wed, 22 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DengWGW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/EvansLMR15,
  author       = {Nicholas W. D. Evans and
                  Stan Z. Li and
                  S{\'{e}}bastien Marcel and
                  Arun Ross},
  title        = {Guest Editorial Special Issue on Biometric Spoofing and Countermeasures},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {4},
  pages        = {699--702},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2406111},
  doi          = {10.1109/TIFS.2015.2406111},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/EvansLMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FanWCX15,
  author       = {Wei Fan and
                  Kai Wang and
                  Fran{\c{c}}ois Cayre and
                  Zhang Xiong},
  title        = {Median Filtered Image Quality Enhancement and Anti-Forensics via Variational
                  Deconvolution},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {5},
  pages        = {1076--1091},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2398362},
  doi          = {10.1109/TIFS.2015.2398362},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/FanWCX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FengL015,
  author       = {Bingwen Feng and
                  Wei Lu and
                  Wei Sun},
  title        = {Secure Binary Image Steganography Based on Minimizing the Distortion
                  on the Texture},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {243--255},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2368364},
  doi          = {10.1109/TIFS.2014.2368364},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FengL015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FerranteLMPT15,
  author       = {Augusto Ferrante and
                  Nicola Laurenti and
                  Chiara Masiero and
                  Michele Pavon and
                  Stefano Tomasin},
  title        = {On the Error Region for Channel Estimation-Based Physical Layer Authentication
                  Over Rayleigh Fading},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {5},
  pages        = {941--952},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2392565},
  doi          = {10.1109/TIFS.2015.2392565},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FerranteLMPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Franco-Contreras15,
  author       = {Javier Franco{-}Contreras and
                  Gouenou Coatrieux},
  title        = {Robust Watermarking of Relational Databases With Ontology-Guided Distortion
                  Control},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {1939--1952},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2439962},
  doi          = {10.1109/TIFS.2015.2439962},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Franco-Contreras15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GaoZJLZ15,
  author       = {Shenghua Gao and
                  Yuting Zhang and
                  Kui Jia and
                  Jiwen Lu and
                  Yingying Zhang},
  title        = {Single Sample Face Recognition via Learning Deep Supervised Autoencoders},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2108--2118},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2446438},
  doi          = {10.1109/TIFS.2015.2446438},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GaoZJLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GarciaQ15,
  author       = {Diogo C. Garcia and
                  Ricardo L. de Queiroz},
  title        = {Face-Spoofing 2D-Detection Based on Moir{\'{e}}-Pattern Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {4},
  pages        = {778--786},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2411394},
  doi          = {10.1109/TIFS.2015.2411394},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GarciaQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GarnaevT15,
  author       = {Andrey Garnaev and
                  Wade Trappe},
  title        = {One-Time Spectrum Coexistence in Dynamic Spectrum Access When the
                  Secondary User May Be Malicious},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {5},
  pages        = {1064--1075},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2398360},
  doi          = {10.1109/TIFS.2015.2398360},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GarnaevT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Gomez-VilardeboG15,
  author       = {Jes{\'{u}}s G{\'{o}}mez{-}Vilardeb{\'{o}} and
                  Deniz G{\"{u}}nd{\"{u}}z},
  title        = {Smart Meter Privacy for Multiple Users in the Presence of an Alternative
                  Energy Source},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {132--141},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2365365},
  doi          = {10.1109/TIFS.2014.2365365},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Gomez-VilardeboG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GragnanielloPSV15,
  author       = {Diego Gragnaniello and
                  Giovanni Poggi and
                  Carlo Sansone and
                  Luisa Verdoliva},
  title        = {An Investigation of Local Descriptors for Biometric Spoofing Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {4},
  pages        = {849--863},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2404294},
  doi          = {10.1109/TIFS.2015.2404294},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GragnanielloPSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuanTWS15,
  author       = {Kyle Guan and
                  Antonia M. Tulino and
                  Peter J. Winzer and
                  Emina Soljanin},
  title        = {Secrecy Capacities in Space-Division Multiplexed Fiber Optic Communication
                  Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {7},
  pages        = {1325--1335},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2405897},
  doi          = {10.1109/TIFS.2015.2405897},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuanTWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoNSTS15,
  author       = {Linjie Guo and
                  Jiangqun Ni and
                  Wenkang Su and
                  Chengpei Tang and
                  Yun{-}Qing Shi},
  title        = {Using Statistical Image Model for {JPEG} Steganography: Uniform Embedding
                  Revisited},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2669--2680},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2473815},
  doi          = {10.1109/TIFS.2015.2473815},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuoNSTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Hajj-AhmadG015,
  author       = {Adi Hajj{-}Ahmad and
                  Ravi Garg and
                  Min Wu},
  title        = {ENF-Based Region-of-Recording Identification for Media Signals},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1125--1136},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2398367},
  doi          = {10.1109/TIFS.2015.2398367},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Hajj-AhmadG015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanSMAC15,
  author       = {Jinguang Han and
                  Willy Susilo and
                  Yi Mu and
                  Man Ho Au and
                  Jie Cao},
  title        = {{AAC-OT:} Accountable Oblivious Transfer With Access Control},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2502--2514},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2464781},
  doi          = {10.1109/TIFS.2015.2464781},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HanSMAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanSMZA15,
  author       = {Jinguang Han and
                  Willy Susilo and
                  Yi Mu and
                  Jianying Zhou and
                  Man Ho Allen Au},
  title        = {Improving Privacy and Security in Decentralized Ciphertext-Policy
                  Attribute-Based Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {665--678},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2382297},
  doi          = {10.1109/TIFS.2014.2382297},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HanSMZA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HarounG15,
  author       = {Mohamed F. Haroun and
                  T. Aaron Gulliver},
  title        = {Secret Key Generation Using Chaotic Signals Over Frequency Selective
                  Fading Channels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1764--1775},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2428211},
  doi          = {10.1109/TIFS.2015.2428211},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HarounG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeZXH15,
  author       = {Debiao He and
                  Sherali Zeadally and
                  Baowen Xu and
                  Xinyi Huang},
  title        = {An Efficient Identity-Based Conditional Privacy-Preserving Authentication
                  Scheme for Vehicular Ad Hoc Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2681--2691},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2473820},
  doi          = {10.1109/TIFS.2015.2473820},
  timestamp    = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HeZXH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HildebrandtD15,
  author       = {Mario Hildebrandt and
                  Jana Dittmann},
  title        = {StirTraceV2.0: Enhanced Benchmarking and Tuning of Printed Fingerprint
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {4},
  pages        = {833--848},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2405412},
  doi          = {10.1109/TIFS.2015.2405412},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HildebrandtD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HolubF15,
  author       = {Vojtech Holub and
                  Jessica J. Fridrich},
  title        = {Low-Complexity Features for {JPEG} Steganalysis Using Undecimated
                  {DCT}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {219--228},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2364918},
  doi          = {10.1109/TIFS.2014.2364918},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HolubF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HongXL15,
  author       = {Jia{-}An Hong and
                  Kaiping Xue and
                  Wei Li},
  title        = {Comments on "DAC-MACS: Effective Data Access Control for Multiauthority
                  Cloud Storage Systems" / Security Analysis of Attribute Revocation
                  in Multiauthority Data Access Control for Cloud Storage Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1315--1317},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2407327},
  doi          = {10.1109/TIFS.2015.2407327},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HongXL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HoushmandAF15,
  author       = {Shiva Houshmand and
                  Sudhir Aggarwal and
                  R. Flood},
  title        = {Next Gen {PCFG} Password Cracking},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1776--1791},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2428671},
  doi          = {10.1109/TIFS.2015.2428671},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HoushmandAF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuCYY15,
  author       = {Jianwei Hu and
                  Yueming Cai and
                  Nan (Jonas) Yang and
                  Weiwei Yang},
  title        = {A New Secure Transmission Scheme With Outdated Antenna Selection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2435--2446},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2464703},
  doi          = {10.1109/TIFS.2015.2464703},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HuCYY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuZLY15,
  author       = {Xiaocheng Hu and
                  Weiming Zhang and
                  Xiaolong Li and
                  Nenghai Yu},
  title        = {Minimum Rate Prediction and Optimized Histograms Modification for
                  Reversible Data Hiding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {653--664},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2392556},
  doi          = {10.1109/TIFS.2015.2392556},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuZLY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuaGT15,
  author       = {Guang Hua and
                  Jonathan Goh and
                  Vrizlynn L. L. Thing},
  title        = {Cepstral Analysis for the Application of Echo-Based Audio Watermark
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {1850--1861},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2431997},
  doi          = {10.1109/TIFS.2015.2431997},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuaGT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangELY15,
  author       = {Sheng Huang and
                  Ahmed M. Elgammal and
                  Jiwen Lu and
                  Dan Yang},
  title        = {Cross-Speed Gait Recognition Using Speed-Invariant Gait Templates
                  and Globality-Locality Preserving Projections},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2071--2083},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2445315},
  doi          = {10.1109/TIFS.2015.2445315},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangELY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangZH15,
  author       = {Yonggang Huang and
                  Jun Zhang and
                  Heyan Huang},
  title        = {Camera Model Identification With Unknown Models},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2692--2704},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2474836},
  doi          = {10.1109/TIFS.2015.2474836},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangZH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HwangCCN15,
  author       = {Jung Yeon Hwang and
                  Liqun Chen and
                  Hyun Sook Cho and
                  DaeHun Nyang},
  title        = {Short Dynamic Group Signature Scheme Supporting Controllable Linkability},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1109--1124},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2390497},
  doi          = {10.1109/TIFS.2015.2390497},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HwangCCN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JafarianAD15,
  author       = {Jafar Haadi Jafarian and
                  Ehab Al{-}Shaer and
                  Qi Duan},
  title        = {An Effective Address Mutation Approach for Disrupting Reconnaissance
                  Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2562--2577},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2467358},
  doi          = {10.1109/TIFS.2015.2467358},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JafarianAD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Jiang15,
  author       = {Shaoquan Jiang},
  title        = {On the Optimality of Keyless Authentication in a Noisy Model},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1250--1261},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2405891},
  doi          = {10.1109/TIFS.2015.2405891},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Jiang15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Jiang15a,
  author       = {Shaoquan Jiang},
  title        = {On the Size of Source Space in a Secure {MAC}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {2007--2015},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2442523},
  doi          = {10.1109/TIFS.2015.2442523},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Jiang15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangWYXZ15,
  author       = {Jiao Jiao Jiang and
                  Sheng Wen and
                  Shui Yu and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {K-Center: An Approach on the Multi-Source Identification of Information
                  Diffusion},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2616--2626},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2469256},
  doi          = {10.1109/TIFS.2015.2469256},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangWYXZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JinLR15,
  author       = {Yi Jin and
                  Jiwen Lu and
                  Qiuqi Ruan},
  title        = {Coupled Discriminative Feature Learning for Heterogeneous Face Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {640--652},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2390414},
  doi          = {10.1109/TIFS.2015.2390414},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JinLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JolfaeiWM15,
  author       = {Alireza Jolfaei and
                  Xin{-}Wen Wu and
                  Vallipuram Muthukkumarasamy},
  title        = {A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial
                  Stability},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {409--422},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2378146},
  doi          = {10.1109/TIFS.2014.2378146},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JolfaeiWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JungLWW15,
  author       = {Taeho Jung and
                  Xiang{-}Yang Li and
                  Zhiguo Wan and
                  Meng Wan},
  title        = {Control Cloud Data Access Privilege and Anonymity With Fully Anonymous
                  Attribute-Based Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {190--199},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2368352},
  doi          = {10.1109/TIFS.2014.2368352},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JungLWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KalantariZGHO15,
  author       = {Ashkan Kalantari and
                  Gan Zheng and
                  Zhen Gao and
                  Zhu Han and
                  Bj{\"{o}}rn E. Ottersten},
  title        = {Secrecy Analysis on Network Coding in Bidirectional Multibeam Satellite
                  Communications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {1862--1874},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2432732},
  doi          = {10.1109/TIFS.2015.2432732},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/KalantariZGHO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KaminagaYS15,
  author       = {Masahiro Kaminaga and
                  Hideki Yoshikawa and
                  Toshinori Suzuki},
  title        = {Double Counting in 2\({}^{\mbox{t}}\)-ary {RSA} Precomputation Reveals
                  the Secret Exponent},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {7},
  pages        = {1394--1401},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2411213},
  doi          = {10.1109/TIFS.2015.2411213},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KaminagaYS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KarachontzitisTKB15,
  author       = {Sotirios Karachontzitis and
                  Stelios Timotheou and
                  Ioannis Krikidis and
                  Kostas Berberidis},
  title        = {Security-Aware Max-Min Resource Allocation in Multiuser {OFDMA} Downlink},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {529--542},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2384392},
  doi          = {10.1109/TIFS.2014.2384392},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KarachontzitisTKB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KhandakerW15,
  author       = {Muhammad R. A. Khandaker and
                  Kai{-}Kit Wong},
  title        = {Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {40--54},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2363033},
  doi          = {10.1109/TIFS.2014.2363033},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KhandakerW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimSAS15,
  author       = {Jongkil Kim and
                  Willy Susilo and
                  Man Ho Au and
                  Jennifer Seberry},
  title        = {Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized
                  Ciphertext},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {679--693},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2388156},
  doi          = {10.1109/TIFS.2014.2388156},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KimSAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KomogortsevKH15,
  author       = {Oleg V. Komogortsev and
                  Alexey Karpov and
                  Corey D. Holland},
  title        = {Attack of Mechanical Replicas: Liveness Detection With Eye Movements},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {4},
  pages        = {716--725},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2405345},
  doi          = {10.1109/TIFS.2015.2405345},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KomogortsevKH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KungTH15,
  author       = {Hsin{-}Wen Kung and
                  Yi{-}Han Tu and
                  Chiou{-}Ting Hsu},
  title        = {Dual Subspace Nonnegative Graph Embedding for Identity-Independent
                  Expression Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {626--639},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2390138},
  doi          = {10.1109/TIFS.2015.2390138},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KungTH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Kwon015,
  author       = {Taekyoung Kwon and
                  Jin Hong},
  title        = {Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing
                  and Recording Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {278--292},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2374352},
  doi          = {10.1109/TIFS.2014.2374352},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/Kwon015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Laarhoven15,
  author       = {Thijs Laarhoven},
  title        = {Asymptotics of Fingerprinting and Group Testing: Tight Bounds From
                  Channel Capacities},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {1967--1980},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2440190},
  doi          = {10.1109/TIFS.2015.2440190},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Laarhoven15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiCY15,
  author       = {Enping Li and
                  Scott Craver and
                  Jun Yu},
  title        = {Capacity Limits of Pseudorandom Channels in Deception Problems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {1824--1834},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2423656},
  doi          = {10.1109/TIFS.2015.2423656},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiCY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiHPS15,
  author       = {Cai Li and
                  Jiankun Hu and
                  Josef Pieprzyk and
                  Willy Susilo},
  title        = {A New Biocryptosystem-Oriented Security Analysis Framework and Implementation
                  of Multibiometric Cryptosystems Based on Decision Level Fusion},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1193--1206},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2402593},
  doi          = {10.1109/TIFS.2015.2402593},
  timestamp    = {Tue, 07 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiHPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLYS15,
  author       = {Jian Li and
                  Xiaolong Li and
                  Bin Yang and
                  Xingming Sun},
  title        = {Segmentation-Based Image Copy-Move Forgery Detection Scheme},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {507--518},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2381872},
  doi          = {10.1109/TIFS.2014.2381872},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiLYS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiM15,
  author       = {Mu Li and
                  Vishal Monga},
  title        = {Twofold Video Hashing With Automatic Synchronization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1727--1738},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2425362},
  doi          = {10.1109/TIFS.2015.2425362},
  timestamp    = {Mon, 21 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiMZY15,
  author       = {Xiaoyong Li and
                  Huadong Ma and
                  Feng Zhou and
                  Wenbin Yao},
  title        = {T-Broker: {A} Trust-Aware Service Brokering Scheme for Multiple Cloud
                  Collaborative Services},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {7},
  pages        = {1402--1415},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2413386},
  doi          = {10.1109/TIFS.2015.2413386},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiMZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiNLTH15,
  author       = {Bin Li and
                  Tian{-}Tsong Ng and
                  Xiaolong Li and
                  Shunquan Tan and
                  Jiwu Huang},
  title        = {Revealing the Trace of High-Quality {JPEG} Compression Through Quantization
                  Noise Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {558--573},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2389148},
  doi          = {10.1109/TIFS.2015.2389148},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiNLTH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiWLTH15,
  author       = {Bin Li and
                  Ming Wang and
                  Xiaolong Li and
                  Shunquan Tan and
                  Jiwu Huang},
  title        = {A Strategy of Clustering Modification Directions in Spatial Image
                  Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {1905--1917},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2434600},
  doi          = {10.1109/TIFS.2015.2434600},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiWLTH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZGY15,
  author       = {Xiaolong Li and
                  Weiming Zhang and
                  Xinlu Gui and
                  Bin Yang},
  title        = {Efficient Reversible Data Hiding Based on Multiple Histograms Modification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {2016--2027},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2444354},
  doi          = {10.1109/TIFS.2015.2444354},
  timestamp    = {Tue, 13 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiZGY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZYY15,
  author       = {Ke Li and
                  Weiming Zhang and
                  Ce Yang and
                  Nenghai Yu},
  title        = {Security Analysis on One-to-Many Order Preserving Encryption-Based
                  Cloud Data Search},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {1918--1926},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2435697},
  doi          = {10.1109/TIFS.2015.2435697},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiZYY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZZSF15,
  author       = {Qi Li and
                  Xinwen Zhang and
                  Qingji Zheng and
                  Ravi S. Sandhu and
                  Xiaoming Fu},
  title        = {{LIVE:} Lightweight Integrity Verification and Content Access Control
                  for Named Data Networking},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {308--320},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2365742},
  doi          = {10.1109/TIFS.2014.2365742},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiZZSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LianCML15,
  author       = {Bin Lian and
                  Gongliang Chen and
                  Maode Ma and
                  Jianhua Li},
  title        = {Periodic K-Times Anonymous Authentication With Efficient Revocation
                  of Violator's Credential},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {543--557},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2386658},
  doi          = {10.1109/TIFS.2014.2386658},
  timestamp    = {Sun, 03 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LianCML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiangDX15,
  author       = {Yicong Liang and
                  Xiaoqing Ding and
                  Jing{-}Hao Xue},
  title        = {Advanced Joint Bayesian Method for Face Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {346--354},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2375552},
  doi          = {10.1109/TIFS.2014.2375552},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiangDX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiangS15,
  author       = {Kaitai Liang and
                  Willy Susilo},
  title        = {Searchable Attribute-Based Mechanism With Efficient Data Sharing for
                  Secure Cloud Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {1981--1992},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2442215},
  doi          = {10.1109/TIFS.2015.2442215},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiangS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiangSL15,
  author       = {Kaitai Liang and
                  Willy Susilo and
                  Joseph K. Liu},
  title        = {Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1578--1589},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2419186},
  doi          = {10.1109/TIFS.2015.2419186},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiangSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinCCLH15,
  author       = {Kevin Lin and
                  Shen{-}Chi Chen and
                  Chu{-}Song Chen and
                  Daw{-}Tung Lin and
                  Yi{-}Ping Hung},
  title        = {Abandoned Object Detection via Temporal Consistency Modeling and Back-Tracing
                  Verification for Visual Surveillance},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {7},
  pages        = {1359--1370},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2408263},
  doi          = {10.1109/TIFS.2015.2408263},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LinCCLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinZMW15,
  author       = {Suqing Lin and
                  Rui Zhang and
                  Hui Ma and
                  Suqing Wang},
  title        = {Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2119--2130},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2449264},
  doi          = {10.1109/TIFS.2015.2449264},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LinZMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LingLWYF15,
  author       = {Zhen Ling and
                  Junzhou Luo and
                  Kui Wu and
                  Wei Yu and
                  Xinwen Fu},
  title        = {TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over
                  Tor},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2515--2530},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2465934},
  doi          = {10.1109/TIFS.2015.2465934},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LingLWYF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuCCHAZ15,
  author       = {Joseph K. Liu and
                  Cheng{-}Kang Chu and
                  Sherman S. M. Chow and
                  Xinyi Huang and
                  Man Ho Au and
                  Jianying Zhou},
  title        = {Time-Bound Anonymous Authentication for Roaming Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {178--189},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2366300},
  doi          = {10.1109/TIFS.2014.2366300},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuCCHAZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuCW15,
  author       = {Manhua Liu and
                  Xiaoying Chen and
                  Xiaoduan Wang},
  title        = {Latent Fingerprint Enhancement via Multi-Scale Patch Based Sparse
                  Representation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {6--15},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2360582},
  doi          = {10.1109/TIFS.2014.2360582},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuCW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuCW15a,
  author       = {Zhen Liu and
                  Zhenfu Cao and
                  Duncan S. Wong},
  title        = {Traceable {CP-ABE:} How to Trace Decryption Devices Found in the Wild},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {55--68},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2363562},
  doi          = {10.1109/TIFS.2014.2363562},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuCW15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuYK15,
  author       = {Kuan{-}Hsien Liu and
                  Shuicheng Yan and
                  C.{-}C. Jay Kuo},
  title        = {Age Estimation via Grouping and Decision Fusion},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2408--2423},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2462732},
  doi          = {10.1109/TIFS.2015.2462732},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuYK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuLWM15,
  author       = {Jiwen Lu and
                  Venice Erin Liong and
                  Gang Wang and
                  Pierre Moulin},
  title        = {Joint Feature Learning for Face Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {7},
  pages        = {1371--1383},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2408431},
  doi          = {10.1109/TIFS.2015.2408431},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuLWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuWDJ15,
  author       = {Jiwen Lu and
                  Gang Wang and
                  Weihong Deng and
                  Kui Jia},
  title        = {Reconstruction-Based Metric Learning for Unconstrained Face Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {79--89},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2363792},
  doi          = {10.1109/TIFS.2014.2363792},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuWDJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaHZY15,
  author       = {Sha Ma and
                  Qiong Huang and
                  Mingwu Zhang and
                  Bo Yang},
  title        = {Efficient Public Key Encryption With Equality Test Supporting Flexible
                  Authorization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {458--470},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2378592},
  doi          = {10.1109/TIFS.2014.2378592},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaHZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaZW15,
  author       = {Y. Ma and
                  Li{-}Min Zhang and
                  H. Wang},
  title        = {Reconstructing Synchronous Scrambler With Robust Detection Capability
                  in the Presence of Noise},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {397--408},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2378143},
  doi          = {10.1109/TIFS.2014.2378143},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaZW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaioranaHC15,
  author       = {Emanuele Maiorana and
                  Gabriel Emile Hine and
                  Patrizio Campisi},
  title        = {Hill-Climbing Attacks on Multibiometrics Recognition Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {5},
  pages        = {900--915},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2384735},
  doi          = {10.1109/TIFS.2014.2384735},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaioranaHC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaityA15,
  author       = {Sayan Maity and
                  Mohamed Abdel{-}Mottaleb},
  title        = {3D Ear Segmentation and Classification Through Indexing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {423--435},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2379437},
  doi          = {10.1109/TIFS.2014.2379437},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaityA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MartinKMH15,
  author       = {Honorio Mart{\'{\i}}n and
                  Thomas Korak and
                  Enrique San Mill{\'{a}}n and
                  Michael Hutter},
  title        = {Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering
                  on Randomness},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {266--277},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2374072},
  doi          = {10.1109/TIFS.2014.2374072},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MartinKMH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MasoumiR15,
  author       = {Massoud Masoumi and
                  Mohammad Hadi Rezayati},
  title        = {Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation
                  Against Differential Electromagnetic and Power Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {256--265},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2371237},
  doi          = {10.1109/TIFS.2014.2371237},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MasoumiR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MenottiCPSPFR15,
  author       = {David Menotti and
                  Giovani Chiachia and
                  Allan da Silva Pinto and
                  William Robson Schwartz and
                  H{\'{e}}lio Pedrini and
                  Alexandre Xavier Falc{\~{a}}o and
                  Anderson Rocha},
  title        = {Deep Representations for Iris, Face, and Fingerprint Spoofing Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {4},
  pages        = {864--879},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2398817},
  doi          = {10.1109/TIFS.2015.2398817},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MenottiCPSPFR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MiaoXWB15,
  author       = {Fuyou Miao and
                  Yan Xiong and
                  Xingfu Wang and
                  Moaman Badawy},
  title        = {Randomized Component and Its Application to (t, m, n)-Group Oriented
                  Secret Sharing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {5},
  pages        = {889--899},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2384393},
  doi          = {10.1109/TIFS.2014.2384393},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MiaoXWB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MoeiniM15,
  author       = {Ali Moeini and
                  Hossein Moeini},
  title        = {Real-World and Rapid Face Recognition Toward Pose and Expression Variations
                  via Feature Library Matrix},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {5},
  pages        = {969--984},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2393553},
  doi          = {10.1109/TIFS.2015.2393553},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MoeiniM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NaghibiSS15,
  author       = {Farshad Naghibi and
                  Somayeh Salimi and
                  Mikael Skoglund},
  title        = {The {CEO} Problem With Secrecy Constraints},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1234--1249},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2404134},
  doi          = {10.1109/TIFS.2015.2404134},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NaghibiSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NavalLRGC15,
  author       = {Smita Naval and
                  Vijay Laxmi and
                  Muttukrishnan Rajarajan and
                  Manoj Singh Gaur and
                  Mauro Conti},
  title        = {Employing Program Semantics for Malware Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2591--2604},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2469253},
  doi          = {10.1109/TIFS.2015.2469253},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/NavalLRGC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NguyenC15,
  author       = {Huu{-}Tuan Nguyen and
                  Alice Caplier},
  title        = {Local Patterns of Gradients for Face Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1739--1751},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2426144},
  doi          = {10.1109/TIFS.2015.2426144},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NguyenC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NingDCWL15,
  author       = {Jianting Ning and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Lifei Wei and
                  Xiaodong Lin},
  title        = {White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting
                  Flexible Attributes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1274--1288},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2405905},
  doi          = {10.1109/TIFS.2015.2405905},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NingDCWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NurhudatianaK15,
  author       = {Arfika Nurhudatiana and
                  Adams Wai{-}Kin Kong},
  title        = {On Criminal Identification in Color Skin Images Using Skin Marks {(RPPVSM)}
                  and Fusion With Inferred Vein Patterns},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {5},
  pages        = {916--931},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2387575},
  doi          = {10.1109/TIFS.2014.2387575},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NurhudatianaK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OdeluDG15,
  author       = {Vanga Odelu and
                  Ashok Kumar Das and
                  Adrijit Goswami},
  title        = {A Secure Biometrics-Based Multi-Server Authentication Protocol Using
                  Smart Cards},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {1953--1966},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2439964},
  doi          = {10.1109/TIFS.2015.2439964},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/OdeluDG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OdinakaOSR15,
  author       = {Ikenna Odinaka and
                  Joseph A. O'Sullivan and
                  Erik J. Sirevaag and
                  John W. Rohrbaugh},
  title        = {Cardiovascular Biometrics: Combining Mechanical and Electrical Signals},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {16--27},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2361261},
  doi          = {10.1109/TIFS.2014.2361261},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/OdinakaOSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OthmanD15,
  author       = {Nadia Othman and
                  Bernadette Dorizzi},
  title        = {Impact of Quality-Based Fusion Techniques for Video-Based Iris Recognition
                  at a Distance},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1590--1602},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2421314},
  doi          = {10.1109/TIFS.2015.2421314},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/OthmanD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ParkLL15,
  author       = {Seunghwan Park and
                  Kwangsu Lee and
                  Dong Hoon Lee},
  title        = {New Constructions of Revocable Identity-Based Encryption From Multilinear
                  Maps},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1564--1577},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2419180},
  doi          = {10.1109/TIFS.2015.2419180},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ParkLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ParsaeefardL15,
  author       = {Saeedeh Parsaeefard and
                  Tho Le{-}Ngoc},
  title        = {Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2095--2107},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2446436},
  doi          = {10.1109/TIFS.2015.2446436},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ParsaeefardL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PayerHGBF15,
  author       = {Mathias Payer and
                  Ling Huang and
                  Neil Zhenqiang Gong and
                  Kevin Borgolte and
                  Mario Frank},
  title        = {What You Submit Is Who You Are: {A} Multimodal Approach for Deanonymizing
                  Scientific Publications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {200--212},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2368355},
  doi          = {10.1109/TIFS.2014.2368355},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PayerHGBF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PintoSPR15,
  author       = {Allan da Silva Pinto and
                  William Robson Schwartz and
                  H{\'{e}}lio Pedrini and
                  Anderson de Rezende Rocha},
  title        = {Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {5},
  pages        = {1025--1038},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2395139},
  doi          = {10.1109/TIFS.2015.2395139},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PintoSPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PohC15,
  author       = {Norman Poh and
                  Chi{-}Ho Chan},
  title        = {Generalizing {DET} Curves Across Application Scenarios},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2171--2181},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2434320},
  doi          = {10.1109/TIFS.2015.2434320},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PohC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PolakG15,
  author       = {Adam C. Polak and
                  Dennis L. Goeckel},
  title        = {Wireless Device Identification Based on {RF} Oscillator Imperfections},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2492--2501},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2464778},
  doi          = {10.1109/TIFS.2015.2464778},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PolakG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Proenca15,
  author       = {Hugo Proen{\c{c}}a},
  title        = {Iris Recognition: What Is Beyond Bit Fragility?},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {321--332},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2371691},
  doi          = {10.1109/TIFS.2014.2371691},
  timestamp    = {Fri, 23 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Proenca15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PunYB15,
  author       = {Chi{-}Man Pun and
                  Xiaochen Yuan and
                  Xiu{-}Li Bi},
  title        = {Image Forgery Detection Using Adaptive Oversegmentation and Feature
                  Point Matching},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1705--1716},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2423261},
  doi          = {10.1109/TIFS.2015.2423261},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PunYB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QinDLM15,
  author       = {Baodong Qin and
                  Robert H. Deng and
                  Shengli Liu and
                  Siqi Ma},
  title        = {Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {7},
  pages        = {1384--1393},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2410137},
  doi          = {10.1109/TIFS.2015.2410137},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/QinDLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RaghavendraB15,
  author       = {Ramachandra Raghavendra and
                  Christoph Busch},
  title        = {Robust Scheme for Iris Presentation Attack Detection Using Multiscale
                  Binarized Statistical Image Features},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {4},
  pages        = {703--715},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2400393},
  doi          = {10.1109/TIFS.2015.2400393},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RaghavendraB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RajaRB15,
  author       = {Kiran B. Raja and
                  Ramachandra Raghavendra and
                  Christoph Busch},
  title        = {Video Presentation Attack Detection in Visible Spectrum Iris Recognition
                  Using Magnified Phase Information},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2048--2056},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2440188},
  doi          = {10.1109/TIFS.2015.2440188},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RajaRB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RattaniSR15,
  author       = {Ajita Rattani and
                  Walter J. Scheirer and
                  Arun Ross},
  title        = {Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2447--2460},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2464772},
  doi          = {10.1109/TIFS.2015.2464772},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RattaniSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ReisingTJ15,
  author       = {Donald R. Reising and
                  Michael A. Temple and
                  Julie Ann Jackson},
  title        = {Authorized and Rogue Device Discrimination Using Dimensionally Reduced
                  {RF-DNA} Fingerprints},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1180--1192},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2400426},
  doi          = {10.1109/TIFS.2015.2400426},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ReisingTJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RenCTW15,
  author       = {Yanzhen Ren and
                  Tingting Cai and
                  Ming Tang and
                  Lina Wang},
  title        = {{AMR} Steganalysis Based on the Probability of Same Pulse Position},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {1801--1811},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2421322},
  doi          = {10.1109/TIFS.2015.2421322},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/RenCTW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RezvaniSIBJ15,
  author       = {Mohsen Rezvani and
                  Verica Sekulic and
                  Aleksandar Ignjatovic and
                  Elisa Bertino and
                  Sanjay K. Jha},
  title        = {Interdependent Security Risk Analysis of Hosts and Flows},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2325--2339},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2455414},
  doi          = {10.1109/TIFS.2015.2455414},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RezvaniSIBJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RichterSEJ15,
  author       = {Johannes Richter and
                  Christian Scheunert and
                  Sabrina Engelmann and
                  Eduard A. Jorswieck},
  title        = {Weak Secrecy in the Multiway Untrusted Relay Channel With Compute-and-Forward},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1262--1273},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2405903},
  doi          = {10.1109/TIFS.2015.2405903},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RichterSEJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RothLRM15,
  author       = {Joseph Roth and
                  Xiaoming Liu and
                  Arun Ross and
                  Dimitris N. Metaxas},
  title        = {Investigating the Discriminative Power of Keystroke Sound},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {333--345},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2374424},
  doi          = {10.1109/TIFS.2014.2374424},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RothLRM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SanchezSHNER15,
  author       = {Jon S{\'{a}}nchez and
                  Ibon Saratxaga and
                  Inma Hern{\'{a}}ez and
                  Eva Navas and
                  Daniel Erro and
                  Tuomo Raitio},
  title        = {Toward a Universal Synthetic Speech Spoofing Detection Using Phase
                  Information},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {4},
  pages        = {810--820},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2398812},
  doi          = {10.1109/TIFS.2015.2398812},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SanchezSHNER15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ScanlonG15,
  author       = {Jacob R. Scanlon and
                  Matthew S. Gerber},
  title        = {Forecasting Violent Extremist Cyber Recruitment},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2461--2470},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2464775},
  doi          = {10.1109/TIFS.2015.2464775},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ScanlonG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SenguptaTC15,
  author       = {Avik Sengupta and
                  Ravi Tandon and
                  T. Charles Clancy},
  title        = {Fundamental Limits of Caching With Secure Delivery},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {355--370},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2375553},
  doi          = {10.1109/TIFS.2014.2375553},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SenguptaTC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SeoWSB15,
  author       = {Seung{-}Hyun Seo and
                  Jongho Won and
                  Salmin Sultana and
                  Elisa Bertino},
  title        = {Effective Key Management in Dynamic Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {371--383},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2375555},
  doi          = {10.1109/TIFS.2014.2375555},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SeoWSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SgroiFBP15,
  author       = {Amanda Sgroi and
                  Patrick J. Flynn and
                  Kevin W. Bowyer and
                  P. Jonathon Phillips},
  title        = {Strong, Neutral, or Weak: Exploring the Impostor Score Distribution},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1207--1220},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2403136},
  doi          = {10.1109/TIFS.2015.2403136},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SgroiFBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SharanM15,
  author       = {Roneel V. Sharan and
                  Tom J. Moir},
  title        = {Subband Time-Frequency Image Texture Features for Robust Audio Surveillance},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2605--2615},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2469254},
  doi          = {10.1109/TIFS.2015.2469254},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SharanM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShinWG15,
  author       = {Seungwon Shin and
                  Haopei Wang and
                  Guofei Gu},
  title        = {A First Step Toward Network Security Virtualization: From Concept
                  To Prototype},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2236--2249},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2453936},
  doi          = {10.1109/TIFS.2015.2453936},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShinWG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShresthaM0LS15,
  author       = {Babins Shrestha and
                  Di Ma and
                  Yan Zhu and
                  Haoyu Li and
                  Nitesh Saxena},
  title        = {Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging
                  Smartphone Malware},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2270--2283},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2436364},
  doi          = {10.1109/TIFS.2015.2436364},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ShresthaM0LS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShuYB15,
  author       = {Xiaokui Shu and
                  Danfeng Yao and
                  Elisa Bertino},
  title        = {Privacy-Preserving Detection of Sensitive Data Exposure},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {5},
  pages        = {1092--1103},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2398363},
  doi          = {10.1109/TIFS.2015.2398363},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShuYB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SizovKKWM15,
  author       = {Aleksandr Sizov and
                  Elie Khoury and
                  Tomi Kinnunen and
                  Zhizheng Wu and
                  S{\'{e}}bastien Marcel},
  title        = {Joint Speaker Verification and Antispoofing in the i-Vector Space},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {4},
  pages        = {821--832},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2407362},
  doi          = {10.1109/TIFS.2015.2407362},
  timestamp    = {Sat, 18 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SizovKKWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Skoric15,
  author       = {Boris Skoric},
  title        = {Tally-Based Simple Decoders for Traitor Tracing and Group Testing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1221--1233},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2403575},
  doi          = {10.1109/TIFS.2015.2403575},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Skoric15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SmerekaBK15,
  author       = {Jonathon M. Smereka and
                  Vishnu Naresh Boddeti and
                  B. V. K. Vijaya Kumar},
  title        = {Probabilistic Deformation Models for Challenging Periocular Image
                  Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {1875--1890},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2434271},
  doi          = {10.1109/TIFS.2015.2434271},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SmerekaBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SmithWL15,
  author       = {Daniel F. Smith and
                  Arnold Wiliem and
                  Brian C. Lovell},
  title        = {Face Recognition on Consumer Devices: Reflections on Replay Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {4},
  pages        = {736--745},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2398819},
  doi          = {10.1109/TIFS.2015.2398819},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SmithWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SoneeH15,
  author       = {Amir Sonee and
                  Ghosheh Abed Hodtani},
  title        = {On the Secrecy Rate Region of Multiple-Access Wiretap Channel With
                  Noncausal Side Information},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1151--1166},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2400416},
  doi          = {10.1109/TIFS.2015.2400416},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SoneeH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunSWJ15,
  author       = {He Sun and
                  Kun Sun and
                  Yuewu Wang and
                  Jiwu Jing},
  title        = {Reliable and Trustworthy Memory Acquisition on Smartphones},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2547--2561},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2467356},
  doi          = {10.1109/TIFS.2015.2467356},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SunSWJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TahaS15,
  author       = {Mostafa M. I. Taha and
                  Patrick Schaumont},
  title        = {Key Updating for Leakage Resiliency With Application to {AES} Modes
                  of Operation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {519--528},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2383359},
  doi          = {10.1109/TIFS.2014.2383359},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TahaS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TamsMM15,
  author       = {Benjamin Tams and
                  Preda Mihailescu and
                  Axel Munk},
  title        = {Security Considerations in Minutiae-Based Fuzzy Vaults},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {5},
  pages        = {985--998},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2392559},
  doi          = {10.1109/TIFS.2015.2392559},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TamsMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TanB15,
  author       = {Vincent Y. F. Tan and
                  Matthieu R. Bloch},
  title        = {Information Spectrum Approach to Strong Converse Theorems for Degraded
                  Wiretap Channels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {1891--1904},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2434592},
  doi          = {10.1109/TIFS.2015.2434592},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TanB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Tatli15,
  author       = {Emin Islam Tatli},
  title        = {Cracking More Password Hashes With Patterns},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1656--1665},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2422259},
  doi          = {10.1109/TIFS.2015.2422259},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Tatli15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ThongkamwitoonM15,
  author       = {Thirapiroon Thongkamwitoon and
                  Hani Muammar and
                  Pier Luigi Dragotti},
  title        = {An Image Recapture Detection Algorithm Based on Learning Dictionaries
                  of Edge Profiles},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {5},
  pages        = {953--968},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2392566},
  doi          = {10.1109/TIFS.2015.2392566},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ThongkamwitoonM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TirunagariPWISH15,
  author       = {Santosh Tirunagari and
                  Norman Poh and
                  David Windridge and
                  Aamo Iorliam and
                  Nik Suki and
                  Anthony T. S. Ho},
  title        = {Detection of Face Spoofing Using Visual Dynamics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {4},
  pages        = {762--777},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2406533},
  doi          = {10.1109/TIFS.2015.2406533},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TirunagariPWISH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TomasinD15,
  author       = {Stefano Tomasin and
                  Alberto Dall'Arche},
  title        = {Resource Allocation for Secret Key Agreement Over Parallel Channels
                  With Full and Partial Eavesdropper {CSI}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2314--2324},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2455412},
  doi          = {10.1109/TIFS.2015.2455412},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TomasinD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/UzunS15,
  author       = {Erkam Uzun and
                  Husrev Taha Sencar},
  title        = {Carving Orphaned {JPEG} File Fragments},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1549--1563},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2416685},
  doi          = {10.1109/TIFS.2015.2416685},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/UzunS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Veugen15,
  author       = {Thijs Veugen},
  title        = {Linear Round Bit-Decomposition of Secret-Shared Values},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {498--506},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2373811},
  doi          = {10.1109/TIFS.2014.2373811},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Veugen15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/VeugenHCM15,
  author       = {Thijs Veugen and
                  Robbert de Haan and
                  Ronald Cramer and
                  Frank Muller},
  title        = {A Framework for Secure Computations With Two Non-Colluding Servers
                  and Multiple Clients, Applied to Recommendations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {445--457},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2370255},
  doi          = {10.1109/TIFS.2014.2370255},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/VeugenHCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/VoloshynovskiyH15,
  author       = {Slava Voloshynovskiy and
                  Taras Holotyak and
                  Fokko Beekhof},
  title        = {Soft Content Fingerprinting With Bit Polarization Based on Sign-Magnitude
                  Decomposition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2033--2047},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2432744},
  doi          = {10.1109/TIFS.2015.2432744},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/VoloshynovskiyH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangKDEP15,
  author       = {Lifeng Wang and
                  Kyeong Jin Kim and
                  Trung Quang Duong and
                  Maged Elkashlan and
                  H. Vincent Poor},
  title        = {Security Enhancement of Cooperative Single Carrier Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {90--103},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2360437},
  doi          = {10.1109/TIFS.2014.2360437},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangKDEP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangPZZLX15,
  author       = {Xiaofeng Wang and
                  Kemu Pang and
                  Xiaorui Zhou and
                  Yang Zhou and
                  Lu Li and
                  Jianru Xue},
  title        = {A Visual Model-Based Perceptual Image Hash for Content Authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {7},
  pages        = {1336--1349},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2407698},
  doi          = {10.1109/TIFS.2015.2407698},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangPZZLX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangQWXD15,
  author       = {Huaqun Wang and
                  Bo Qin and
                  Qianhong Wu and
                  Li Xu and
                  Josep Domingo{-}Ferrer},
  title        = {{TPP:} Traceable Privacy-Preserving Communication and Precise Reward
                  for Vehicle-to-Grid Networks in Smart Grids},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2340--2351},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2455513},
  doi          = {10.1109/TIFS.2015.2455513},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangQWXD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangWCY15,
  author       = {Yi Wang and
                  Lipeng Wang and
                  Yiu{-}ming Cheung and
                  Pong C. Yuen},
  title        = {Learning Compact Binary Codes for Hash-Based Fingerprint Indexing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1603--1616},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2421332},
  doi          = {10.1109/TIFS.2015.2421332},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangWCY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WattanachoteSCC15,
  author       = {Kanoksak Wattanachote and
                  Timothy K. Shih and
                  Wen{-}Lung Chang and
                  Hon{-}Hang Chang},
  title        = {Tamper Detection of {JPEG} Image Due to Seam Modifications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2477--2491},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2464776},
  doi          = {10.1109/TIFS.2015.2464776},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WattanachoteSCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Weaver15,
  author       = {Rhiannon Weaver},
  title        = {Visualizing and Modeling the Scanning Behavior of the Conficker Botnet
                  in the Presence of User and Network Activity},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {5},
  pages        = {1039--1051},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2396478},
  doi          = {10.1109/TIFS.2015.2396478},
  timestamp    = {Sun, 01 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Weaver15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WenHJ15,
  author       = {Di Wen and
                  Hu Han and
                  Anil K. Jain},
  title        = {Face Spoof Detection With Image Distortion Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {4},
  pages        = {746--761},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2400395},
  doi          = {10.1109/TIFS.2015.2400395},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WenHJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WenLGZ15,
  author       = {Lingyun Wen and
                  Xin Li and
                  Guodong Guo and
                  Yu Zhu},
  title        = {Automated Depression Diagnosis Based on Facial Dynamic Analysis and
                  Sparse Coding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {7},
  pages        = {1432--1441},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2414392},
  doi          = {10.1109/TIFS.2015.2414392},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WenLGZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WengAMM15,
  author       = {Li Weng and
                  Laurent Amsaleg and
                  April Morton and
                  St{\'{e}}phane Marchand{-}Maillet},
  title        = {A Privacy-Preserving Framework for Large-Scale Content-Based Information
                  Retrieval},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {152--167},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2365998},
  doi          = {10.1109/TIFS.2014.2365998},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WengAMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuZBD15,
  author       = {Yongdong Wu and
                  Zhigang Zhao and
                  Feng Bao and
                  Robert H. Deng},
  title        = {Software Puzzle: {A} Countermeasure to Resource-Inflated Denial-of-Service
                  Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {168--177},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2366293},
  doi          = {10.1109/TIFS.2014.2366293},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WuZBD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiongLLG15,
  author       = {Qi Xiong and
                  Ying{-}Chang Liang and
                  Kwok Hung Li and
                  Yi Gong},
  title        = {An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack
                  in Multiple-Antenna Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {5},
  pages        = {932--940},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2392564},
  doi          = {10.1109/TIFS.2015.2392564},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XiongLLG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiongLZT15,
  author       = {Tao Xiong and
                  Wei Lou and
                  Jie Zhang and
                  Hailun Tan},
  title        = {{MIO:} Enhancing Wireless Communications Security Through Physical
                  Layer Multiple Inter-Symbol Obfuscation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1678--1691},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2422264},
  doi          = {10.1109/TIFS.2015.2422264},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XiongLZT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiongQ15,
  author       = {Hu Xiong and
                  Zhiguang Qin},
  title        = {Revocable and Scalable Certificateless Remote Authentication Protocol
                  With Anonymity for Wireless Body Area Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {7},
  pages        = {1442--1455},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2414399},
  doi          = {10.1109/TIFS.2015.2414399},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XiongQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiongTMXW15,
  author       = {Jun Xiong and
                  Yanqun Tang and
                  Dongtang Ma and
                  Pei Xiao and
                  Kai{-}Kit Wong},
  title        = {Secrecy Performance Analysis for {TAS-MRC} System With Imperfect Feedback},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1617--1629},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2421358},
  doi          = {10.1109/TIFS.2015.2421358},
  timestamp    = {Wed, 27 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XiongTMXW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuWWSDJ15,
  author       = {Peng Xu and
                  Qianhong Wu and
                  Wei Wang and
                  Willy Susilo and
                  Josep Domingo{-}Ferrer and
                  Hai Jin},
  title        = {Generating Searchable Public-Key Ciphertexts With Hidden Structures
                  for Fast Keyword Search},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {1993--2006},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2442220},
  doi          = {10.1109/TIFS.2015.2442220},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XuWWSDJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangLYL15,
  author       = {Jianwei Yang and
                  Zhen Lei and
                  Dong Yi and
                  Stan Z. Li},
  title        = {Person-Specific Face Antispoofing With Subject Domain Adaptation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {4},
  pages        = {797--809},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2403306},
  doi          = {10.1109/TIFS.2015.2403306},
  timestamp    = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangLYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YaoBV15,
  author       = {Guang Yao and
                  Jun Bi and
                  Athanasios V. Vasilakos},
  title        = {Passive {IP} Traceback: Disclosing the Locations of {IP} Spoofers
                  From Path Backscatter},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {471--484},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2381873},
  doi          = {10.1109/TIFS.2014.2381873},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YaoBV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuM15,
  author       = {Honghai Yu and
                  Pierre Moulin},
  title        = {{SNR} Maximization Hashing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {1927--1938},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2436871},
  doi          = {10.1109/TIFS.2015.2436871},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YuM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuRWV15,
  author       = {Jia Yu and
                  Kui Ren and
                  Cong Wang and
                  Vijay Varadharajan},
  title        = {Enabling Cloud Storage Auditing With Key-Exposure Resistance},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1167--1179},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2400425},
  doi          = {10.1109/TIFS.2015.2400425},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YuRWV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuanY15,
  author       = {Jiawei Yuan and
                  Shucheng Yu},
  title        = {Public Integrity Auditing for Dynamic Data Sharing With Multiuser
                  Modification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1717--1726},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2423264},
  doi          = {10.1109/TIFS.2015.2423264},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YuanY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YunL015,
  author       = {Xiao{-}chun Yun and
                  Shuhao Li and
                  Yongzheng Zhang},
  title        = {{SMS} Worm Propagation Over Contact Social Networks: Modeling and
                  Validation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2365--2380},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2455413},
  doi          = {10.1109/TIFS.2015.2455413},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YunL015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Zancajo-Blazquez15,
  author       = {Sandra Zancajo{-}Blazquez and
                  Susana Lag{\"{u}}ela{-}Lopez and
                  Diego Gonz{\'{a}}lez{-}Aguilera and
                  Joaquin Martinez{-}Sanchez},
  title        = {Segmentation of Indoor Mapping Point Clouds Applied to Crime Scenes
                  Reconstruction},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {7},
  pages        = {1350--1358},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2407699},
  doi          = {10.1109/TIFS.2015.2407699},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/Zancajo-Blazquez15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaiAEHHGM15,
  author       = {Xiaojun Zhai and
                  Kofi Appiah and
                  Shoaib Ehsan and
                  W. Gareth J. Howells and
                  Huosheng Hu and
                  Dongbing Gu and
                  Klaus D. McDonald{-}Maier},
  title        = {A Method for Detecting Abnormal Program Behavior on Embedded Devices},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1692--1704},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2422674},
  doi          = {10.1109/TIFS.2015.2422674},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaiAEHHGM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhanXX15,
  author       = {Zhenxin Zhan and
                  Maochao Xu and
                  Shouhuai Xu},
  title        = {Predicting Cyber Attack Rates With Extreme Values},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1666--1677},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2422261},
  doi          = {10.1109/TIFS.2015.2422261},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhanXX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangFCKR15,
  author       = {Le Zhang and
                  Xuanyao Fong and
                  Chip{-}Hong Chang and
                  Zhi{-}Hui Kong and
                  Kaushik Roy},
  title        = {Highly Reliable Spin-Transfer Torque Magnetic RAM-Based Physical Unclonable
                  Function With Multi-Response-Bits Per Cell},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1630--1642},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2421481},
  doi          = {10.1109/TIFS.2015.2421481},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangFCKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangLLQ15,
  author       = {Jiliang Zhang and
                  Yaping Lin and
                  Yongqiang Lyu and
                  Gang Qu},
  title        = {A {PUF-FSM} Binding Scheme for {FPGA} {IP} Protection and Pay-Per-Device
                  Licensing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1137--1150},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2400413},
  doi          = {10.1109/TIFS.2015.2400413},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangLLQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangWDQD15,
  author       = {Lei Zhang and
                  Qianhong Wu and
                  Josep Domingo{-}Ferrer and
                  Bo Qin and
                  Zheming Dong},
  title        = {Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement
                  Protocol for Secure Group Communications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2352--2364},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2447933},
  doi          = {10.1109/TIFS.2015.2447933},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangWDQD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoZYL015,
  author       = {Pu Zhao and
                  Meng Zhang and
                  Hui Yu and
                  Hanwen Luo and
                  Wen Chen},
  title        = {Robust Beamforming Design for Sum Secrecy Rate Optimization in {MU-MISO}
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {1812--1823},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2423263},
  doi          = {10.1109/TIFS.2015.2423263},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaoZYL015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouDCV15,
  author       = {Jun Zhou and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Athanasios V. Vasilakos},
  title        = {Secure and privacy preserving protocol for cloud-based vehicular DTNs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1299--1314},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2407326},
  doi          = {10.1109/TIFS.2015.2407326},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhouDCV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouJIZZT15,
  author       = {Peng Zhou and
                  Siwei Jiang and
                  Athirai Aravazhi Irissappane and
                  Jie Zhang and
                  Jianying Zhou and
                  Joseph Chee Ming Teo},
  title        = {Toward Energy-Efficient Trust System Through Watchdog Optimization
                  for WSNs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {613--625},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2389145},
  doi          = {10.1109/TIFS.2015.2389145},
  timestamp    = {Sun, 30 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhouJIZZT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouVH15,
  author       = {Lan Zhou and
                  Vijay Varadharajan and
                  Michael Hitchens},
  title        = {Trust Enhanced Cryptographic Role-Based Access Control for Secure
                  Cloud Data Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2381--2395},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2455952},
  doi          = {10.1109/TIFS.2015.2455952},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhouVH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuNLY15,
  author       = {Chunsheng Zhu and
                  Hasen Nicanfar and
                  Victor C. M. Leung and
                  Laurence T. Yang},
  title        = {An Authenticated Trust and Reputation Calculation and Management System
                  for Cloud and Sensor Networks Integration},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {118--131},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2364679},
  doi          = {10.1109/TIFS.2014.2364679},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuNLY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuXLZ15,
  author       = {Tianqing Zhu and
                  Ping Xiong and
                  Gang Li and
                  Wanlei Zhou},
  title        = {Correlated Differential Privacy: Hiding Information in Non-IID Data
                  Set},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {229--242},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2368363},
  doi          = {10.1109/TIFS.2014.2368363},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuXLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuYTSH15,
  author       = {Yihai Zhu and
                  Jun Yan and
                  Yufei Tang and
                  Yan Lindsay Sun and
                  Haibo He},
  title        = {Joint Substation-Transmission Line Vulnerability Assessment Against
                  the Smart Grid},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {5},
  pages        = {1010--1024},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2394240},
  doi          = {10.1109/TIFS.2015.2394240},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuYTSH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/sedenkaGGB15,
  author       = {Jaroslav Sedenka and
                  Sathya Govindarajan and
                  Paolo Gasti and
                  Kiran S. Balagani},
  title        = {Secure Outsourced Biometric Authentication With Performance Evaluation
                  on Smartphones},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {384--396},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2375571},
  doi          = {10.1109/TIFS.2014.2375571},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/sedenkaGGB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics