Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Search dblp for Publications

export results for "toc:db/journals/tifs/tifs11.bht:"

 download as .bib file

@article{DBLP:journals/tifs/0001SGK16,
  author       = {Zhe Liu and
                  Hwajeong Seo and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Howon Kim},
  title        = {Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography
                  for 8-bit AVR-Based Sensor Nodes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1385--1397},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2491261},
  doi          = {10.1109/TIFS.2015.2491261},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/0001SGK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AbrardoBKT16,
  author       = {Andrea Abrardo and
                  Mauro Barni and
                  Kassem Kallas and
                  Benedetta Tondi},
  title        = {A Game-Theoretic Framework for Optimum Decision Fusion in the Presence
                  of Byzantines},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1333--1345},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2526963},
  doi          = {10.1109/TIFS.2016.2526963},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AbrardoBKT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Al-RubaieC16,
  author       = {Mohammad Al{-}Rubaie and
                  J. Morris Chang},
  title        = {Reconstruction Attacks Against Mobile-Based Continuous Authentication
                  Systems in the Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2648--2663},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2594132},
  doi          = {10.1109/TIFS.2016.2594132},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Al-RubaieC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlamTMAAAKVB16,
  author       = {Quratulain Alam and
                  Saher Tabbasum and
                  Saif Ur Rehman Malik and
                  Masoom Alam and
                  Tamleek Ali and
                  Adnan Akhunzada and
                  Samee Ullah Khan and
                  Athanasios V. Vasilakos and
                  Rajkumar Buyya},
  title        = {Formal Verification of the xDAuth Protocol},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {1956--1969},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2561909},
  doi          = {10.1109/TIFS.2016.2561909},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlamTMAAAKVB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlmalawiFTAAZ16,
  author       = {Abdulmohsen Almalawi and
                  Adil Fahad and
                  Zahir Tari and
                  Abdullah Alamri and
                  Rayed AlGhamdi and
                  Albert Y. Zomaya},
  title        = {An Efficient Data-Driven Clustering Technique to Detect Attacks in
                  {SCADA} Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {893--906},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2512522},
  doi          = {10.1109/TIFS.2015.2512522},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlmalawiFTAAZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ArastehMJ16,
  author       = {Abdollah Arasteh and
                  Mohammad Hassan Moradi and
                  Amin Janghorbani},
  title        = {A Novel Method Based on Empirical Mode Decomposition for P300-Based
                  Detection of Deception},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2584--2593},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2590938},
  doi          = {10.1109/TIFS.2016.2590938},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ArastehMJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Arora0JP16,
  author       = {Sunpreet S. Arora and
                  Kai Cao and
                  Anil K. Jain and
                  Nicholas G. Paulter Jr.},
  title        = {Design and Fabrication of 3D Fingerprint Targets},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2284--2297},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2581306},
  doi          = {10.1109/TIFS.2016.2581306},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Arora0JP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AwanZS16,
  author       = {Zohaib Hassan Awan and
                  Abdellatif Zaidi and
                  Aydin Sezgin},
  title        = {On SDoF of Multi-Receiver Wiretap Channel With Alternating {CSIT}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1780--1795},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2547863},
  doi          = {10.1109/TIFS.2016.2547863},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AwanZS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BajajCS16,
  author       = {Sumeet Bajaj and
                  Anrin Chakraborti and
                  Radu Sion},
  title        = {Practical Foundations of History Independence},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {2},
  pages        = {303--312},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2491309},
  doi          = {10.1109/TIFS.2015.2491309},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BajajCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BarniT16,
  author       = {Mauro Barni and
                  Benedetta Tondi},
  title        = {Source Distinguishability Under Distortion-Limited Attack: An Optimal
                  Transport Perspective},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2145--2159},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2570739},
  doi          = {10.1109/TIFS.2016.2570739},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BarniT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BernardiniR16,
  author       = {Riccardo Bernardini and
                  Roberto Rinaldo},
  title        = {Analytic and Simulation Results about a Compact, Reliable, and Unbiased
                  1-bit Physically Unclonable Constant},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2804--2817},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2599008},
  doi          = {10.1109/TIFS.2016.2599008},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BernardiniR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BharadwajBVS16,
  author       = {Samarth Bharadwaj and
                  Himanshu S. Bhatt and
                  Mayank Vatsa and
                  Richa Singh},
  title        = {Domain Specific Learning for Newborn Face Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1630--1641},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2538744},
  doi          = {10.1109/TIFS.2016.2538744},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BharadwajBVS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BharatiSVB16,
  author       = {Aparna Bharati and
                  Richa Singh and
                  Mayank Vatsa and
                  Kevin W. Bowyer},
  title        = {Detecting Facial Retouching Using Supervised Deep Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {1903--1913},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2561898},
  doi          = {10.1109/TIFS.2016.2561898},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BharatiSVB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BianchiBM16,
  author       = {Tiziano Bianchi and
                  Valerio Bioglio and
                  Enrico Magli},
  title        = {Analysis of One-Time Random Projections for Privacy Preserving Compressed
                  Sensing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {2},
  pages        = {313--327},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2493982},
  doi          = {10.1109/TIFS.2015.2493982},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/BianchiBM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BihlBT16,
  author       = {Trevor J. Bihl and
                  Kenneth W. Bauer Jr. and
                  Michael A. Temple},
  title        = {Feature Selection for {RF} Fingerprinting With Multiple Discriminant
                  Analysis and Using ZigBee Device Emissions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1862--1874},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2561902},
  doi          = {10.1109/TIFS.2016.2561902},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BihlBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BockS16,
  author       = {Johan de Bock and
                  Patrick de Smet},
  title        = {JPGcarve: An Advanced Tool for Automated Recovery of Fragmented {JPEG}
                  Files},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {1},
  pages        = {19--34},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2475238},
  doi          = {10.1109/TIFS.2015.2475238},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BockS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BondiPBB16,
  author       = {Enrico Bondi and
                  Pietro Pala and
                  Stefano Berretti and
                  Alberto Del Bimbo},
  title        = {Reconstructing High-Resolution Face Models From Kinect Depth Sequences},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2843--2853},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2601059},
  doi          = {10.1109/TIFS.2016.2601059},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BondiPBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BossuetC16,
  author       = {Lilian Bossuet and
                  Brice Colombier},
  title        = {Comments on "A {PUF-FSM} Binding Scheme for {FPGA} {IP} Protection
                  and Pay-per-Device Licensing"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2624--2625},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2553454},
  doi          = {10.1109/TIFS.2016.2553454},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BossuetC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BoulkenafetKH16,
  author       = {Zinelabidine Boulkenafet and
                  Jukka Komulainen and
                  Abdenour Hadid},
  title        = {Face Spoofing Detection Using Colour Texture Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1818--1830},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2555286},
  doi          = {10.1109/TIFS.2016.2555286},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BoulkenafetKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaminaMTM16,
  author       = {Jos{\'{e}} Benito Cami{\~{n}}a and
                  Ra{\'{u}}l Monroy and
                  Luis A. Trejo and
                  Miguel Angel Medina{-}P{\'{e}}rez},
  title        = {Temporal and Spatial Locality: An Abstraction for Masquerade Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {2036--2051},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2571679},
  doi          = {10.1109/TIFS.2016.2571679},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CaminaMTM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaoWLGY16,
  author       = {Ruohan Cao and
                  Tan F. Wong and
                  Tiejun Lv and
                  Hui Gao and
                  Shaoshi Yang},
  title        = {Detecting Byzantine Attacks Without Clean Reference},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2717--2731},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2596140},
  doi          = {10.1109/TIFS.2016.2596140},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CaoWLGY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CarvalhoFPTR16,
  author       = {Tiago Jose de Carvalho and
                  F{\'{a}}bio Augusto Faria and
                  H{\'{e}}lio Pedrini and
                  Ricardo da Silva Torres and
                  Anderson Rocha},
  title        = {Illuminant-Based Transformed Spaces for Image Forensics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {720--733},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2506548},
  doi          = {10.1109/TIFS.2015.2506548},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CarvalhoFPTR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CastiglioneSMPC16,
  author       = {Arcangelo Castiglione and
                  Alfredo De Santis and
                  Barbara Masucci and
                  Francesco Palmieri and
                  Aniello Castiglione and
                  Jin Li and
                  Xinyi Huang},
  title        = {Hierarchical and Shared Access Control},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {850--865},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2512533},
  doi          = {10.1109/TIFS.2015.2512533},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CastiglioneSMPC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CastiglioneSMPC16a,
  author       = {Arcangelo Castiglione and
                  Alfredo De Santis and
                  Barbara Masucci and
                  Francesco Palmieri and
                  Aniello Castiglione and
                  Xinyi Huang},
  title        = {Cryptographic Hierarchical Access Control for Dynamic Structures},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2349--2364},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2581147},
  doi          = {10.1109/TIFS.2016.2581147},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CastiglioneSMPC16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaviglioneGLMU16,
  author       = {Luca Caviglione and
                  Mauro Gaggero and
                  Jean{-}Fran{\c{c}}ois Lalande and
                  Wojciech Mazurczyk and
                  Marcin Urbanski},
  title        = {Seeing the Unseen: Revealing Mobile Malware Hidden Communications
                  via Energy Consumption and Artificial Intelligence},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {799--810},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2510825},
  doi          = {10.1109/TIFS.2015.2510825},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CaviglioneGLMU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenASWRKLBF16,
  author       = {Yiyu Chen and
                  Ayalneh Dessalegn Atnafu and
                  Isabella Schlattner and
                  Wendimagegn Tariku Weldtsadik and
                  Myung{-}Cheol Roh and
                  Hyoung Joong Kim and
                  Seong{-}Whan Lee and
                  Benjamin Blankertz and
                  Siamac Fazli},
  title        = {A High-Security EEG-Based Login System with {RSVP} Stimuli and Dry
                  Electrodes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2635--2647},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2577551},
  doi          = {10.1109/TIFS.2016.2577551},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenASWRKLBF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenCGN16,
  author       = {Jian Chen and
                  Xiaoming Chen and
                  Wolfgang H. Gerstacker and
                  Derrick Wing Kwan Ng},
  title        = {Resource Allocation for a Massive {MIMO} Relay Aided Secure Communication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1700--1711},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2551685},
  doi          = {10.1109/TIFS.2016.2551685},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenCGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenEMS16,
  author       = {Cong Chen and
                  Thomas Eisenbarth and
                  Ingo von Maurich and
                  Rainer Steinwandt},
  title        = {Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1093--1105},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2509944},
  doi          = {10.1109/TIFS.2015.2509944},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenEMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenMYGHWW16,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Fuchun Guo and
                  Xinyi Huang and
                  Xiaofen Wang and
                  Yongjun Wang},
  title        = {Server-Aided Public Key Encryption With Keyword Search},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2833--2842},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2599293},
  doi          = {10.1109/TIFS.2016.2599293},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenMYGHWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenMYGW16,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Fuchun Guo and
                  Xiaofen Wang},
  title        = {Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud
                  Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {789--798},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2510822},
  doi          = {10.1109/TIFS.2015.2510822},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenMYGW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenN16,
  author       = {Kan Chen and
                  Balasubramaniam Natarajan},
  title        = {Evaluating Node Reliability in Cooperative {MIMO} Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1453--1460},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2532841},
  doi          = {10.1109/TIFS.2016.2532841},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenSCF16,
  author       = {Jianxu Chen and
                  Feng Shen and
                  Danny Ziyi Chen and
                  Patrick J. Flynn},
  title        = {Iris Recognition Based on Human-Interpretable Features},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1476--1485},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2535901},
  doi          = {10.1109/TIFS.2016.2535901},
  timestamp    = {Tue, 13 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenSCF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChengDLT16,
  author       = {Long Cheng and
                  Dinil Mon Divakaran and
                  Wee{-}Yong Lim and
                  Vrizlynn L. L. Thing},
  title        = {Opportunistic Piggyback Marking for {IP} Traceback},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {2},
  pages        = {273--288},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2491299},
  doi          = {10.1109/TIFS.2015.2491299},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChengDLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChengLJT16,
  author       = {Chi Cheng and
                  Jemin Lee and
                  Tao Jiang and
                  Tsuyoshi Takagi},
  title        = {Security Analysis and Improvements on Two Homomorphic Authentication
                  Schemes for Network Coding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {993--1002},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2515517},
  doi          = {10.1109/TIFS.2016.2515517},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChengLJT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CheonKK16,
  author       = {Jung Hee Cheon and
                  Miran Kim and
                  Myungsun Kim},
  title        = {Optimized Search-and-Compute Circuits and Their Application to Query
                  Evaluation on Encrypted Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {1},
  pages        = {188--199},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2483486},
  doi          = {10.1109/TIFS.2015.2483486},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CheonKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CherkaouiB016,
  author       = {Abdelkarim Cherkaoui and
                  Lilian Bossuet and
                  C{\'{e}}dric Marchand},
  title        = {Design, Evaluation, and Optimization of Physical Unclonable Functions
                  Based on Transient Effect Ring Oscillators},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1291--1305},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2524666},
  doi          = {10.1109/TIFS.2016.2524666},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/CherkaouiB016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChernyshevVH16,
  author       = {Maxim Chernyshev and
                  Craig Valli and
                  Peter Hannay},
  title        = {On 802.11 Access Point Locatability and Named Entity Recognition in
                  Service Set Identifiers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {3},
  pages        = {584--593},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2507542},
  doi          = {10.1109/TIFS.2015.2507542},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChernyshevVH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChuCL16,
  author       = {Xiaoyu Chu and
                  Yan Chen and
                  K. J. Ray Liu},
  title        = {Detectability of the Order of Operations: An Information Theoretic
                  Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {823--836},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2510958},
  doi          = {10.1109/TIFS.2015.2510958},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChuCL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChuCSL16,
  author       = {Xiaoyu Chu and
                  Yan Chen and
                  Matthew C. Stamm and
                  K. J. Ray Liu},
  title        = {Information Theoretical Limit of Media Forensics: The Forensicability},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {774--788},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2510820},
  doi          = {10.1109/TIFS.2015.2510820},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChuCSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CompagnoCDDPT16,
  author       = {Alberto Compagno and
                  Mauro Conti and
                  Antonio Alberto D'Amico and
                  Gianluca Dini and
                  Pericle Perazzo and
                  Lorenzo Taponecco},
  title        = {Modeling Enlargement Attacks Against {UWB} Distance Bounding Protocols},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1565--1577},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2541613},
  doi          = {10.1109/TIFS.2016.2541613},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/CompagnoCDDPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ContiMSV16,
  author       = {Mauro Conti and
                  Luigi Vincenzo Mancini and
                  Riccardo Spolaor and
                  Nino Vincenzo Verde},
  title        = {Analyzing Android Encrypted Network Traffic to Identify User Actions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {1},
  pages        = {114--125},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2478741},
  doi          = {10.1109/TIFS.2015.2478741},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ContiMSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CuiKKB16,
  author       = {Heng Cui and
                  Ghassan O. Karame and
                  Felix Klaedtke and
                  Roberto Bifulco},
  title        = {On the Fingerprinting of Software-Defined Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2160--2173},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2573756},
  doi          = {10.1109/TIFS.2016.2573756},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CuiKKB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DaiYM16,
  author       = {Bin Dai and
                  Linman Yu and
                  Zheng Ma},
  title        = {Relay Broadcast Channel With Confidential Messages},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {2},
  pages        = {410--425},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2503259},
  doi          = {10.1109/TIFS.2015.2503259},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DaiYM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DantchevaER16,
  author       = {Antitza Dantcheva and
                  Petros Elia and
                  Arun Ross},
  title        = {What Else Does Your Biometric Data Reveal? {A} Survey on Soft Biometrics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {3},
  pages        = {441--467},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2480381},
  doi          = {10.1109/TIFS.2015.2480381},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DantchevaER16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DasLZC16,
  author       = {Sanjeev Das and
                  Yang Liu and
                  Wei Zhang and
                  Mahinthan Chandramohan},
  title        = {Semantics-Based Online Malware Detection: Towards Efficient Real-Time
                  Protection Against Malware},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {2},
  pages        = {289--302},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2491300},
  doi          = {10.1109/TIFS.2015.2491300},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DasLZC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Daugman16,
  author       = {John Daugman},
  title        = {Information Theory and the IrisCode},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {2},
  pages        = {400--409},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2500196},
  doi          = {10.1109/TIFS.2015.2500196},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Daugman16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DavidDGMNP16,
  author       = {Bernardo Machado David and
                  Rafael Dowsley and
                  Jeroen van de Graaf and
                  Davidson Marques and
                  Anderson C. A. Nascimento and
                  Adriana C. B. Pinto},
  title        = {Unconditionally Secure, Universally Composable Privacy Preserving
                  Linear Algebra},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {1},
  pages        = {59--73},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2476783},
  doi          = {10.1109/TIFS.2015.2476783},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DavidDGMNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DenemarkBF16,
  author       = {Tom{\'{a}}s Denemark and
                  Mehdi Boroumand and
                  Jessica J. Fridrich},
  title        = {Steganalysis Features for Content-Adaptive {JPEG} Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1736--1746},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2555281},
  doi          = {10.1109/TIFS.2016.2555281},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DenemarkBF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DengWENM16,
  author       = {Yansha Deng and
                  Lifeng Wang and
                  Maged Elkashlan and
                  Arumugam Nallanathan and
                  Ranjan K. Mallik},
  title        = {Physical Layer Security in Three-Tier Wireless Sensor Networks: {A}
                  Stochastic Geometry Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1128--1138},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2516917},
  doi          = {10.1109/TIFS.2016.2516917},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DengWENM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DiyanatKS16,
  author       = {Abolfazl Diyanat and
                  Ahmad Khonsari and
                  Seyed Pooya Shariatpanahi},
  title        = {A Dummy-Based Approach for Preserving Source Rate Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1321--1332},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2515050},
  doi          = {10.1109/TIFS.2016.2515050},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DiyanatKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DoMC16,
  author       = {Quang Do and
                  Ben Martini and
                  Kim{-}Kwang Raymond Choo},
  title        = {A Data Exfiltration and Remote Exploitation Attack on Consumer 3D
                  Printers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2174--2186},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2578285},
  doi          = {10.1109/TIFS.2016.2578285},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DoMC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DongWT16,
  author       = {Lijun Dong and
                  Kui Wu and
                  Guoming Tang},
  title        = {A Data-Centric Approach to Quality Estimation of Role Mining Results},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2678--2692},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2594137},
  doi          = {10.1109/TIFS.2016.2594137},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DongWT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DubeyGT16,
  author       = {Rohit Kumar Dubey and
                  Jonathan Goh and
                  Vrizlynn L. L. Thing},
  title        = {Fingerprint Liveness Detection From Single Image Using Low-Level Features
                  and Shape Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1461--1475},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2535899},
  doi          = {10.1109/TIFS.2016.2535899},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DubeyGT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DudaKGTD16,
  author       = {Jaroslaw Duda and
                  Pawel Korus and
                  Neeraj J. Gadgil and
                  Khalid Tahboub and
                  Edward J. Delp},
  title        = {Image-Like 2D Barcodes Using Generalizations of the Kuznetsov-Tsybakov
                  Problem},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {691--703},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2506002},
  doi          = {10.1109/TIFS.2015.2506002},
  timestamp    = {Mon, 27 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DudaKGTD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/EdmanKTY16,
  author       = {Matthew Edman and
                  Aggelos Kiayias and
                  Qiang Tang and
                  B{\"{u}}lent Yener},
  title        = {On the Security of Key Extraction From Measuring Physical Quantities},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1796--1806},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2543687},
  doi          = {10.1109/TIFS.2016.2543687},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/EdmanKTY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FanWCX16,
  author       = {Wei Fan and
                  Kai Wang and
                  Fran{\c{c}}ois Cayre and
                  Zhang Xiong},
  title        = {Corrections to "JPEG Anti-Forensics With Improved Tradeoff Between
                  Forensic Undetectability and Image Quality"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2628},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2585398},
  doi          = {10.1109/TIFS.2016.2585398},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/FanWCX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FangLN16,
  author       = {Song Fang and
                  Yao Liu and
                  Peng Ning},
  title        = {Mimicry Attacks Against Wireless Link Signature and New Defense Using
                  Time-Synched Link Signature},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1515--1527},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2541307},
  doi          = {10.1109/TIFS.2016.2541307},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FangLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FeghhiL16,
  author       = {Saman Feghhi and
                  Douglas J. Leith},
  title        = {A Web Traffic Analysis Attack Using Only Timing Information},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1747--1759},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2551203},
  doi          = {10.1109/TIFS.2016.2551203},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FeghhiL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FuWGSR16,
  author       = {Zhangjie Fu and
                  Xinle Wu and
                  Chaowen Guan and
                  Xingming Sun and
                  Kui Ren},
  title        = {Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced
                  Data With Accuracy Improvement},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2706--2716},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2596138},
  doi          = {10.1109/TIFS.2016.2596138},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FuWGSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FueyoH16,
  author       = {Maria Fueyo and
                  Javier Herranz},
  title        = {On the Efficiency of Revocation in RSA-Based Anonymous Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1771--1779},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2559443},
  doi          = {10.1109/TIFS.2016.2559443},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FueyoH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Fujita16,
  author       = {Hachiro Fujita},
  title        = {On the Secrecy Capacity of Wiretap Channels With Side Information
                  at the Transmitter},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2441--2452},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2582558},
  doi          = {10.1109/TIFS.2016.2582558},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Fujita16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Gao16,
  author       = {Quanxue Gao},
  title        = {Rebuttal to "Comments on 'Joint Global and Local Structure Discriminant
                  Analysis"'},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {2},
  pages        = {429--430},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2490622},
  doi          = {10.1109/TIFS.2015.2490622},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Gao16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GarnaevT16,
  author       = {Andrey Garnaev and
                  Wade Trappe},
  title        = {A Bandwidth Monitoring Strategy Under Uncertainty of the Adversary's
                  Activity},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {837--849},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2510959},
  doi          = {10.1109/TIFS.2015.2510959},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GarnaevT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GastiS0ZB16,
  author       = {Paolo Gasti and
                  Jaroslav Sedenka and
                  Qing Yang and
                  Gang Zhou and
                  Kiran S. Balagani},
  title        = {Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2556--2571},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2585093},
  doi          = {10.1109/TIFS.2016.2585093},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GastiS0ZB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GiarettaBC16,
  author       = {Alberto Giaretta and
                  Sasitharan Balasubramaniam and
                  Mauro Conti},
  title        = {Security Vulnerabilities and Countermeasures for Target Localization
                  in Bio-NanoThings Communication Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {665--676},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2505632},
  doi          = {10.1109/TIFS.2015.2505632},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GiarettaBC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoSM16,
  author       = {Fuchun Guo and
                  Willy Susilo and
                  Yi Mu},
  title        = {Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based
                  Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {2},
  pages        = {247--257},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2489179},
  doi          = {10.1109/TIFS.2015.2489179},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuoSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoWCT16,
  author       = {Haoran Guo and
                  Xiaodong Wang and
                  Kun Chang and
                  Ye Tian},
  title        = {Exploiting Path Diversity for Thwarting Pollution Attacks in Named
                  Data Networking},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {2077--2090},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2574307},
  doi          = {10.1109/TIFS.2016.2574307},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuoWCT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HaghighatAA16,
  author       = {Mohammad Haghighat and
                  Mohamed Abdel{-}Mottaleb and
                  Wadee Alhalabi},
  title        = {Discriminant Correlation Analysis: Real-Time Feature Level Fusion
                  for Multimodal Biometric Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {1984--1996},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2569061},
  doi          = {10.1109/TIFS.2016.2569061},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HaghighatAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HaghighiWXQZ16,
  author       = {Mohammad Sayad Haghighi and
                  Sheng Wen and
                  Yang Xiang and
                  Barry G. Quinn and
                  Wanlei Zhou},
  title        = {On the Race of Worms and Patches: Modeling the Spread of Information
                  in Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2854--2865},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2594130},
  doi          = {10.1109/TIFS.2016.2594130},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HaghighiWXQZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HamadeneC16,
  author       = {Assia Hamadene and
                  Youcef Chibani},
  title        = {One-Class Writer-Independent Offline Signature Verification Using
                  Feature Dissimilarity Thresholding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1226--1238},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2521611},
  doi          = {10.1109/TIFS.2016.2521611},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HamadeneC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanACLR16,
  author       = {Yi Han and
                  Tansu Alpcan and
                  Jeffrey Chan and
                  Christopher Leckie and
                  Benjamin I. P. Rubinstein},
  title        = {A Game Theoretical Approach to Defend Against Co-Resident Attacks
                  in Cloud Computing: Preventing Co-Residence Using Semi-Supervised
                  Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {3},
  pages        = {556--570},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2505680},
  doi          = {10.1109/TIFS.2015.2505680},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HanACLR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanLYX16,
  author       = {Weili Han and
                  Zhigong Li and
                  Lang Yuan and
                  Wenyuan Xu},
  title        = {Regional Patterns and Vulnerability Analysis of Chinese Web Passwords},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {2},
  pages        = {258--272},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2490620},
  doi          = {10.1109/TIFS.2015.2490620},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HanLYX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HanZLJZ16,
  author       = {Song Han and
                  Shuai Zhao and
                  Qinghua Li and
                  Chun{-}Hua Ju and
                  Wanlei Zhou},
  title        = {{PPM-HDA:} Privacy-Preserving and Multifunctional Health Data Aggregation
                  With Fault Tolerance},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {1940--1955},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2472369},
  doi          = {10.1109/TIFS.2015.2472369},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HanZLJZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeZKW16,
  author       = {Debiao He and
                  Sherali Zeadally and
                  Neeraj Kumar and
                  Wei Wu},
  title        = {Efficient and Anonymous Mobile User Authentication Protocol Using
                  Self-Certified Public Key Cryptography for Multi-Server Architectures},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {2052--2064},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2573746},
  doi          = {10.1109/TIFS.2016.2573746},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HeZKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HillerYS16,
  author       = {Matthias Hiller and
                  Meng{-}Day (Mandel) Yu and
                  Georg Sigl},
  title        = {Cherry-Picking Reliable {PUF} Bits With Differential Sequence Coding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {2065--2076},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2573766},
  doi          = {10.1109/TIFS.2016.2573766},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HillerYS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuSH16,
  author       = {Yang Hu and
                  Konstantinos Sirlantzis and
                  Gareth Howells},
  title        = {Signal-Level Information Fusion for Less Constrained Iris Recognition
                  Using Sparse-Error Low Rank Matrix Factorization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1549--1564},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2541612},
  doi          = {10.1109/TIFS.2016.2541612},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HuSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuSHC16,
  author       = {Ping Hu and
                  Chi Wan Sung and
                  Siu{-}Wai Ho and
                  Terence H. Chan},
  title        = {Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {2},
  pages        = {388--399},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2500193},
  doi          = {10.1109/TIFS.2015.2500193},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuSHC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuaTFSZ16,
  author       = {Jingyu Hua and
                  An Tang and
                  Yixin Fang and
                  Zhenyu Shen and
                  Sheng Zhong},
  title        = {Privacy-Preserving Utility Verification of the Data Published by Non-Interactive
                  Differentially Private Mechanisms},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2298--2311},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2532839},
  doi          = {10.1109/TIFS.2016.2532839},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuaTFSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuaZGT16,
  author       = {Guang Hua and
                  Ying Zhang and
                  Jonathan Goh and
                  Vrizlynn L. L. Thing},
  title        = {Audio Authentication by Exploring the Absolute-Error-Map of {ENF}
                  Signals},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {1003--1016},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2516824},
  doi          = {10.1109/TIFS.2016.2516824},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HuaZGT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangHS16,
  author       = {Fangjun Huang and
                  Jiwu Huang and
                  Yun{-}Qing Shi},
  title        = {New Framework for Reversible Data Hiding in Encrypted Domain},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2777--2789},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2598528},
  doi          = {10.1109/TIFS.2016.2598528},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuoMG16,
  author       = {Fei Huo and
                  Patrick Mitran and
                  Guang Gong},
  title        = {Analysis and Validation of Active Eavesdropping Attacks in Passive
                  {FHSS} {RFID} Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1528--1541},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2541309},
  doi          = {10.1109/TIFS.2016.2541309},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuoMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/IosifidisG16,
  author       = {Alexandros Iosifidis and
                  Moncef Gabbouj},
  title        = {Scaling Up Class-Specific Kernel Discriminant Analysis for Large-Scale
                  Face Verification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2453--2465},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2582562},
  doi          = {10.1109/TIFS.2016.2582562},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/IosifidisG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/IsmailKLC16,
  author       = {Ziad Ismail and
                  Christophe Kiennert and
                  Jean Leneutre and
                  Lin Chen},
  title        = {Auditing a Cloud Provider's Compliance With Data Backup Requirements:
                  {A} Game Theoretical Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1685--1699},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2549002},
  doi          = {10.1109/TIFS.2016.2549002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/IsmailKLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JahaN16,
  author       = {Emad Sami Jaha and
                  Mark S. Nixon},
  title        = {From Clothing to Identity: Manual and Automatic Soft Biometrics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2377--2390},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2584001},
  doi          = {10.1109/TIFS.2016.2584001},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JahaN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiLGMB16,
  author       = {Shouling Ji and
                  Weiqing Li and
                  Neil Zhenqiang Gong and
                  Prateek Mittal and
                  Raheem A. Beyah},
  title        = {Seed-Based De-Anonymizability Quantification of Social Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1398--1411},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2529591},
  doi          = {10.1109/TIFS.2016.2529591},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JiLGMB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangABCC16,
  author       = {Richard Jiang and
                  Somaya Ali Al{-}M{\'{a}}adeed and
                  Ahmed Bouridane and
                  Danny Crookes and
                  M. Emre Celebi},
  title        = {Face Recognition in the Scrambled Domain via Salience-Aware Ensembles
                  of Many Kernels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1807--1817},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2555792},
  doi          = {10.1109/TIFS.2016.2555792},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangABCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JinSZPM16,
  author       = {Rong Jin and
                  Liu Shi and
                  Kai Zeng and
                  Amit Pande and
                  Prasant Mohapatra},
  title        = {MagPairing: Pairing Smartphones in Close Proximity Using Magnetometers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1306--1320},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2505626},
  doi          = {10.1109/TIFS.2015.2505626},
  timestamp    = {Thu, 16 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JinSZPM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JolfaeiWM16,
  author       = {Alireza Jolfaei and
                  Xin{-}Wen Wu and
                  Vallipuram Muthukkumarasamy},
  title        = {On the Security of Permutation-Only Image Encryption Schemes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {2},
  pages        = {235--246},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2489178},
  doi          = {10.1109/TIFS.2015.2489178},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JolfaeiWM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JungLWW16,
  author       = {Taeho Jung and
                  Xiang{-}Yang Li and
                  Zhiguo Wan and
                  Meng Wan},
  title        = {Rebuttal to "Comments on 'Control Cloud Data Access Privilege and
                  Anonymity With Fully Anonymous Attribute-Based Encryption"'},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {868},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2509946},
  doi          = {10.1109/TIFS.2015.2509946},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JungLWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KarpukC16,
  author       = {David A. Karpuk and
                  Arsenia Chorti},
  title        = {Perfect Secrecy in Physical-Layer Network Coding Systems From Structured
                  Interference},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1875--1887},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2563165},
  doi          = {10.1109/TIFS.2016.2563165},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KarpukC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KolokotronisKK16,
  author       = {Nicholas Kolokotronis and
                  Alexandros Katsiotis and
                  Nicholas Kalouptsidis},
  title        = {Secretly Pruned Convolutional Codes: Security Analysis and Performance
                  Results},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1500--1514},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2537262},
  doi          = {10.1109/TIFS.2016.2537262},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/KolokotronisKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KomogortsevKH16,
  author       = {Oleg Komogortsev and
                  Alexey Karpov and
                  Corey Holland},
  title        = {Oculomotor Plant Characteristics: The Effects of Environment and Stimulus},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {3},
  pages        = {621--632},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2503263},
  doi          = {10.1109/TIFS.2015.2503263},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KomogortsevKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KongYWPZH16,
  author       = {Zhengmin Kong and
                  Shaoshi Yang and
                  Feilong Wu and
                  Shixin Peng and
                  Liang Zhong and
                  Lajos Hanzo},
  title        = {Iterative Distributed Minimum Total {MSE} Approach for Secure Communications
                  in {MIMO} Interference Channels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {3},
  pages        = {594--608},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2493888},
  doi          = {10.1109/TIFS.2015.2493888},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KongYWPZH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KowalskiK16,
  author       = {Marcin Kowalski and
                  Mariusz Kastek},
  title        = {Comparative Studies of Passive Imaging in Terahertz and Mid-Wavelength
                  Infrared Ranges for Object Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {2028--2035},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2571260},
  doi          = {10.1109/TIFS.2016.2571260},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KowalskiK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KumarPB16,
  author       = {Vireshwar Kumar and
                  Jung{-}Min "Jerry" Park and
                  Kaigui Bian},
  title        = {PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {1027--1038},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2516904},
  doi          = {10.1109/TIFS.2016.2516904},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KumarPB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KumarX16,
  author       = {Ajay Kumar and
                  Zhihuan Xu},
  title        = {Personal Identification Using Minor Knuckle Patterns From Palm Dorsal
                  Surface},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2338--2348},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2574309},
  doi          = {10.1109/TIFS.2016.2574309},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KumarX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LazzerettiPB16,
  author       = {Riccardo Lazzeretti and
                  Tommaso Pignata and
                  Mauro Barni},
  title        = {Piecewise Function Approximation With Private Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {3},
  pages        = {642--657},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2503268},
  doi          = {10.1109/TIFS.2015.2503268},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LazzerettiPB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiH16,
  author       = {Cai Li and
                  Jiankun Hu},
  title        = {A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem
                  Using Pair-Polar Minutiae Structures},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {3},
  pages        = {543--555},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2505630},
  doi          = {10.1109/TIFS.2015.2505630},
  timestamp    = {Tue, 07 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiHS16,
  author       = {Zhi{-}Ming Li and
                  Zheng{-}Hai Huang and
                  Kun Shang},
  title        = {A Customized Sparse Representation Model With Mixed Norm for Undersampled
                  Face Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2203--2214},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2567318},
  doi          = {10.1109/TIFS.2016.2567318},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLCDS16,
  author       = {Lichun Li and
                  Rongxing Lu and
                  Kim{-}Kwang Raymond Choo and
                  Anwitaman Datta and
                  Jun Shao},
  title        = {Privacy-Preserving-Outsourced Association Rule Mining on Vertically
                  Partitioned Databases},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1847--1861},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2561241},
  doi          = {10.1109/TIFS.2016.2561241},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiLCDS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLWC16,
  author       = {Beibei Li and
                  Rongxing Lu and
                  Wei Wang and
                  Kim{-}Kwang Raymond Choo},
  title        = {{DDOA:} {A} Dirichlet-Based Detection Scheme for Opportunistic Attacks
                  in Smart Grid Cyber-Physical System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2415--2425},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2576898},
  doi          = {10.1109/TIFS.2016.2576898},
  timestamp    = {Mon, 12 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiLWC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiW16,
  author       = {Shang Li and
                  Xiaodong Wang},
  title        = {Cooperative Change Detection for Voltage Quality Monitoring in Smart
                  Grids},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {1},
  pages        = {86--99},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2477796},
  doi          = {10.1109/TIFS.2015.2477796},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiWLWBG16,
  author       = {Fengyong Li and
                  Kui Wu and
                  Jingsheng Lei and
                  Mi Wen and
                  Zhongqin Bi and
                  Chunhua Gu},
  title        = {Steganalysis Over Large-Scale Social Networks With High-Order Joint
                  Features and Clustering Ensembles},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {2},
  pages        = {344--357},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2496910},
  doi          = {10.1109/TIFS.2015.2496910},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiWLWBG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiYLV16,
  author       = {Yongbo Li and
                  Fan Yao and
                  Tian Lan and
                  Guru Venkataramani},
  title        = {{SARRE:} Semantics-Aware Rule Recommendation and Enforcement for Event
                  Paths on Android},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2748--2762},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2596141},
  doi          = {10.1109/TIFS.2016.2596141},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiYLV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZCLT16,
  author       = {Yuanman Li and
                  Jiantao Zhou and
                  An Cheng and
                  Xianming Liu and
                  Yuan Yan Tang},
  title        = {{SIFT} Keypoint Removal and Injection via Convex Relaxation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1722--1735},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2553645},
  doi          = {10.1109/TIFS.2016.2553645},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiZCLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZLQD16,
  author       = {Jiangtao Li and
                  Lei Zhang and
                  Joseph K. Liu and
                  Haifeng Qian and
                  Zheming Dong},
  title        = {Privacy-Preserving Public Auditing Protocol for Low-Performance End
                  Devices in Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2572--2583},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2587242},
  doi          = {10.1109/TIFS.2016.2587242},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiZLQD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZT16,
  author       = {Fagen Li and
                  Di Zhong and
                  Tsuyoshi Takagi},
  title        = {Efficient Deniably Authenticated Encryption and Its Application to
                  E-Mail},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2477--2486},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2585086},
  doi          = {10.1109/TIFS.2016.2585086},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiZT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiangHGL16,
  author       = {Kaitai Liang and
                  Xinyi Huang and
                  Fuchun Guo and
                  Joseph K. Liu},
  title        = {Privacy-Preserving and Regular Language Search Over Encrypted Cloud
                  Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2365--2376},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2581316},
  doi          = {10.1109/TIFS.2016.2581316},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiangHGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinJ16,
  author       = {Pin{-}Hsun Lin and
                  Eduard A. Jorswieck},
  title        = {On the Fast Fading Gaussian Wiretap Channel With Statistical Channel
                  State Information at the Transmitter},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {1},
  pages        = {46--58},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2476464},
  doi          = {10.1109/TIFS.2015.2476464},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LinJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinL16,
  author       = {Xufeng Lin and
                  Chang{-}Tsun Li},
  title        = {Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {1},
  pages        = {126--140},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2478748},
  doi          = {10.1109/TIFS.2015.2478748},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LinL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Liu016,
  author       = {Eryun Liu and
                  Kai Cao},
  title        = {Minutiae Extraction From Level 1 Features of Fingerprint},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {1893--1902},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2541345},
  doi          = {10.1109/TIFS.2016.2541345},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Liu016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuAHL016,
  author       = {Joseph K. Liu and
                  Man Ho Au and
                  Xinyi Huang and
                  Rongxing Lu and
                  Jin Li},
  title        = {Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing
                  Services},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {3},
  pages        = {484--497},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2493983},
  doi          = {10.1109/TIFS.2015.2493983},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuAHL016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuDCW16,
  author       = {Ximeng Liu and
                  Robert H. Deng and
                  Kim{-}Kwang Raymond Choo and
                  Jian Weng},
  title        = {An Efficient Privacy-Preserving Outsourced Calculation Toolkit With
                  Multiple Keys},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2401--2414},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2573770},
  doi          = {10.1109/TIFS.2016.2573770},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuDCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuDDLQ16,
  author       = {Ximeng Liu and
                  Robert H. Deng and
                  Wenxiu Ding and
                  Rongxing Lu and
                  Baodong Qin},
  title        = {Privacy-Preserving Outsourced Calculation on Floating Point Numbers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2513--2527},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2585121},
  doi          = {10.1109/TIFS.2016.2585121},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuDDLQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuDOL16,
  author       = {Yuxin Liu and
                  Mianxiong Dong and
                  Kaoru Ota and
                  Anfeng Liu},
  title        = {ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {2013--2027},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2570740},
  doi          = {10.1109/TIFS.2016.2570740},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuDOL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLLL16,
  author       = {Xuan Liu and
                  Zhiyi Li and
                  Xingdong Liu and
                  Zuyi Li},
  title        = {Masking Transmission Line Outages via False Data Injection Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1592--1602},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2542061},
  doi          = {10.1109/TIFS.2016.2542061},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuLLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLZDG16,
  author       = {Weiwei Liu and
                  Guangjie Liu and
                  Jiangtao Zhai and
                  Yuewei Dai and
                  Dipak Ghosal},
  title        = {Designing Analog Fountain Timing Channels: Undetectability, Robustness,
                  and Model-Adaptation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {677--690},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2505688},
  doi          = {10.1109/TIFS.2015.2505688},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuLZDG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuQGL16,
  author       = {Weijiang Liu and
                  Wenyu Qu and
                  Jian Gong and
                  Keqiu Li},
  title        = {Detection of Superpoints Using a Vector Bloom Filter},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {3},
  pages        = {514--527},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2503269},
  doi          = {10.1109/TIFS.2015.2503269},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuQGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LouisKH16,
  author       = {Wael Louis and
                  Majid Komeili and
                  Dimitrios Hatzinakos},
  title        = {Continuous Authentication Using One-Dimensional Multi-Resolution Local
                  Binary Patterns {(1DMRLBP)} in {ECG} Biometrics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2818--2832},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2599270},
  doi          = {10.1109/TIFS.2016.2599270},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LouisKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaLYJG16,
  author       = {Haoyu Ma and
                  Ruiqi Li and
                  Xiaoxu Yu and
                  Chunfu Jia and
                  Debin Gao},
  title        = {Integrated Software Fingerprinting via Neural-Network-Based Control
                  Flow Obfuscation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2322--2337},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2555287},
  doi          = {10.1109/TIFS.2016.2555287},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaLYJG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaS16,
  author       = {Bin Ma and
                  Yun Q. Shi},
  title        = {A Reversible Data Hiding Scheme Based on Code Division Multiplexing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {1914--1927},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2566261},
  doi          = {10.1109/TIFS.2016.2566261},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaZY16,
  author       = {Hui Ma and
                  Rui Zhang and
                  Wei Yuan},
  title        = {Comments on "Control Cloud Data Access Privilege and Anonymity With
                  Fully Anonymous Attribute-Based Encryption"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {866--867},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2509865},
  doi          = {10.1109/TIFS.2015.2509865},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaZY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MacRaeST16,
  author       = {Brent MacRae and
                  Amirali Salehi{-}Abari and
                  Julie Thorpe},
  title        = {An Exploration of Geographic Authentication Schemes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {1997--2012},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2570681},
  doi          = {10.1109/TIFS.2016.2570681},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MacRaeST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaioranaRC16,
  author       = {Emanuele Maiorana and
                  Daria La Rocca and
                  Patrizio Campisi},
  title        = {On the Permanence of {EEG} Signals for Biometric Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {1},
  pages        = {163--175},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2481870},
  doi          = {10.1109/TIFS.2015.2481870},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaioranaRC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MansourSB16,
  author       = {Ahmed S. Mansour and
                  Rafael F. Schaefer and
                  Holger Boche},
  title        = {On the Individual Secrecy Capacity Regions of the General, Degraded,
                  and Gaussian Multi-Receiver Wiretap Broadcast Channel},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {2107--2122},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2566260},
  doi          = {10.1109/TIFS.2016.2566260},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MansourSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MazonkaTM16,
  author       = {Oleg Mazonka and
                  Nektarios Georgios Tsoutsos and
                  Michail Maniatakos},
  title        = {Cryptoleq: {A} Heterogeneous Abstract Machine for Encrypted and Unencrypted
                  Computation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {2123--2138},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2569062},
  doi          = {10.1109/TIFS.2016.2569062},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MazonkaTM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MohantyAR16,
  author       = {Manoranjan Mohanty and
                  Muhammad Rizwan Asghar and
                  Giovanni Russello},
  title        = {{\textdollar}2DCrypt{\textdollar} : Image Scaling and Cropping in
                  Encrypted Domains},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2542--2555},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2585085},
  doi          = {10.1109/TIFS.2016.2585085},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MohantyAR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MoharrerWAD16,
  author       = {Ali Moharrer and
                  Shuangqing Wei and
                  George T. Amariucai and
                  Jing Deng},
  title        = {Extractable Common Randomness From Gaussian Trees: Topological and
                  Algebraic Perspectives},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2312--2321},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2543688},
  doi          = {10.1109/TIFS.2016.2543688},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MoharrerWAD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MoosaviB16,
  author       = {Hussein Moosavi and
                  Francis Minhthang Bui},
  title        = {Delay-Aware Optimization of Physical Layer Security in Multi-Hop Wireless
                  Body Area Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {1928--1939},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2566446},
  doi          = {10.1109/TIFS.2016.2566446},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MoosaviB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MurakamiW16,
  author       = {Takao Murakami and
                  Hajime Watanabe},
  title        = {Localization Attacks Using Matrix and Tensor Factorization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1647--1660},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2547865},
  doi          = {10.1109/TIFS.2016.2547865},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MurakamiW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NaghizadehL16,
  author       = {Parinaz Naghizadeh and
                  Mingyan Liu},
  title        = {Opting Out of Incentive Mechanisms: {A} Study of Security as a Non-Excludable
                  Public Good},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2790--2803},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2599005},
  doi          = {10.1109/TIFS.2016.2599005},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NaghizadehL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NainiUTV16,
  author       = {Farid Movahedi Naini and
                  Jayakrishnan Unnikrishnan and
                  Patrick Thiran and
                  Martin Vetterli},
  title        = {Where You Are Is Who You Are: User Identification by Matching Statistics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {2},
  pages        = {358--372},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2498131},
  doi          = {10.1109/TIFS.2015.2498131},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NainiUTV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NeupaneSMK16,
  author       = {Ajaya Neupane and
                  Nitesh Saxena and
                  Jose Omar Maximo and
                  Rajesh K. Kana},
  title        = {Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware
                  Warnings},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {1970--1983},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2566265},
  doi          = {10.1109/TIFS.2016.2566265},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NeupaneSMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NguyenDDS16,
  author       = {Van{-}Dinh Nguyen and
                  Trung Quang Duong and
                  Octavia A. Dobre and
                  Oh{-}Soon Shin},
  title        = {Joint Information and Jamming Beamforming for Secrecy Rate Maximization
                  in Cognitive Radio Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2609--2623},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2594131},
  doi          = {10.1109/TIFS.2016.2594131},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NguyenDDS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NogueiraLM16,
  author       = {Rodrigo Frassetto Nogueira and
                  Roberto de Alencar Lotufo and
                  Rubens Campos Machado},
  title        = {Fingerprint Liveness Detection Using Convolutional Neural Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1206--1213},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2520880},
  doi          = {10.1109/TIFS.2016.2520880},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NogueiraLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OikawaDRG16,
  author       = {Marina A. Oikawa and
                  Zanoni Dias and
                  Anderson de Rezende Rocha and
                  Siome Goldenstein},
  title        = {Manifold Learning and Spectral Clustering for Image Phylogeny Forests},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {1},
  pages        = {5--18},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2442527},
  doi          = {10.1109/TIFS.2015.2442527},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/OikawaDRG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OliveiraFRPBGDR16,
  author       = {Alberto A. de Oliveira and
                  Pasquale Ferrara and
                  Alessia De Rosa and
                  Alessandro Piva and
                  Mauro Barni and
                  Siome Goldenstein and
                  Zanoni Dias and
                  Anderson Rocha},
  title        = {Multiple Parenting Phylogeny Relationships in Digital Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {2},
  pages        = {328--343},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2493989},
  doi          = {10.1109/TIFS.2015.2493989},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/OliveiraFRPBGDR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PasquiniBAN16,
  author       = {Cecilia Pasquini and
                  Giulia Boato and
                  Naif Alajlan and
                  Francesco G. B. De Natale},
  title        = {A Deterministic Approach to Detect Median Filtering in 1D Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1425--1437},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2530636},
  doi          = {10.1109/TIFS.2016.2530636},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/PasquiniBAN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PatelHJ16,
  author       = {Keyurkumar Patel and
                  Hu Han and
                  Anil K. Jain},
  title        = {Secure Face Unlock: Spoof Detection on Smartphones},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2268--2283},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2578288},
  doi          = {10.1109/TIFS.2016.2578288},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PatelHJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PhuongYS16,
  author       = {Tran Viet Xuan Phuong and
                  Guomin Yang and
                  Willy Susilo},
  title        = {Hidden Ciphertext Policy Attribute-Based Encryption Under Standard
                  Assumptions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {1},
  pages        = {35--45},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2475723},
  doi          = {10.1109/TIFS.2015.2475723},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PhuongYS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PintoUC16,
  author       = {S{\'{\i}}lvia Cristina Dias Pinto and
                  Petra Urbanova and
                  Roberto M. Cesar},
  title        = {Two-Dimensional Wavelet Analysis of Supraorbital Margins of the Human
                  Skull for Characterizing Sexual Dimorphism},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1542--1548},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2541611},
  doi          = {10.1109/TIFS.2016.2541611},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PintoUC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ProkhorenkoCA16,
  author       = {Victor Prokhorenko and
                  Kim{-}Kwang Raymond Choo and
                  Helen Ashman},
  title        = {Intent-Based Extensible Real-Time {PHP} Supervision Framework},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2215--2226},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2569063},
  doi          = {10.1109/TIFS.2016.2569063},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ProkhorenkoCA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QinD16,
  author       = {Dongrun Qin and
                  Zhi Ding},
  title        = {Exploiting Multi-Antenna Non-Reciprocal Channels for Shared Secret
                  Key Generation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2693--2705},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2594143},
  doi          = {10.1109/TIFS.2016.2594143},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/QinD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RaghavendraRB16,
  author       = {Ramachandra Raghavendra and
                  Kiran Bylappa Raja and
                  Christoph Busch},
  title        = {Exploring the Usefulness of Light Field Cameras for Biometrics: An
                  Empirical Study on Face and Iris Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {922--936},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2512559},
  doi          = {10.1109/TIFS.2015.2512559},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RaghavendraRB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RahbariK16,
  author       = {Hanif Rahbari and
                  Marwan Krunz},
  title        = {Full Frame Encryption and Modulation Obfuscation Using Channel-Independent
                  Preamble Identifier},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2732--2747},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2582560},
  doi          = {10.1109/TIFS.2016.2582560},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RahbariK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RoyB16,
  author       = {Hiranmoy Roy and
                  Debotosh Bhattacharjee},
  title        = {Local-Gravity-Face (LG-face) for Illumination-Invariant and Heterogeneous
                  Face Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1412--1424},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2530043},
  doi          = {10.1109/TIFS.2016.2530043},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RoyB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RuanWWJ16,
  author       = {Xin Ruan and
                  Zhenyu Wu and
                  Haining Wang and
                  Sushil Jajodia},
  title        = {Profiling Online Social Behaviors for Compromised Account Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {1},
  pages        = {176--187},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2482465},
  doi          = {10.1109/TIFS.2015.2482465},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RuanWWJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Ruiz-BlondetJL16,
  author       = {Maria V. Ruiz{-}Blondet and
                  Zhanpeng Jin and
                  Sarah Laszlo},
  title        = {{CEREBRE:} {A} Novel Method for Very High Accuracy Event-Related Potential
                  Biometric Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1618--1629},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2543524},
  doi          = {10.1109/TIFS.2016.2543524},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Ruiz-BlondetJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SafakaCAF16,
  author       = {Iris Safaka and
                  L{\'{a}}szl{\'{o}} Czap and
                  Katerina J. Argyraki and
                  Christina Fragouli},
  title        = {Creating Secrets Out of Packet Erasures},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1177--1191},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2520887},
  doi          = {10.1109/TIFS.2016.2520887},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SafakaCAF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SainiJD16,
  author       = {Ravikant Saini and
                  Abhishek Jindal and
                  Swades De},
  title        = {Jammer-Assisted Resource Allocation in Secure {OFDMA} With Untrusted
                  Users},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {1055--1070},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2516912},
  doi          = {10.1109/TIFS.2016.2516912},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SainiJD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SalmaniT16,
  author       = {Hassan Salmani and
                  Mark M. Tehranipoor},
  title        = {Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1214--1225},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2520910},
  doi          = {10.1109/TIFS.2016.2520910},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SalmaniT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SangSTZ16,
  author       = {Yingpeng Sang and
                  Hong Shen and
                  Hui Tian and
                  Zonghua Zhang},
  title        = {Achieving Probabilistic Anonymity in a Linear and Hybrid Randomization
                  Model},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2187--2202},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2562605},
  doi          = {10.1109/TIFS.2016.2562605},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SangSTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SaxenaC16,
  author       = {Neetesh Saxena and
                  Bong Jun Choi},
  title        = {Authentication Scheme for Flexible Charging and Discharging of Mobile
                  Vehicles in the {V2G} Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1438--1452},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2532840},
  doi          = {10.1109/TIFS.2016.2532840},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SaxenaC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SaxenaCL16,
  author       = {Neetesh Saxena and
                  Bong Jun Choi and
                  Rongxing Lu},
  title        = {Authentication and Authorization Scheme for Various User Roles and
                  Devices in Smart Grid},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {907--921},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2512525},
  doi          = {10.1109/TIFS.2015.2512525},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SaxenaCL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SchottleB16,
  author       = {Pascal Sch{\"{o}}ttle and
                  Rainer B{\"{o}}hme},
  title        = {Game Theory and Adaptive Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {760--773},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2509941},
  doi          = {10.1109/TIFS.2015.2509941},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SchottleB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SedighiCF16,
  author       = {Vahid Sedighi and
                  R{\'{e}}mi Cogranne and
                  Jessica J. Fridrich},
  title        = {Content-Adaptive Steganography by Minimizing Statistical Detectability},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {2},
  pages        = {221--234},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2486744},
  doi          = {10.1109/TIFS.2015.2486744},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SedighiCF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SenftlebenBBH0T16,
  author       = {Marius Senftleben and
                  Ana Barroso and
                  Mihai Bucicoiu and
                  Matthias Hollick and
                  Stefan Katzenbeisser and
                  Erik Tews},
  title        = {On the Privacy and Performance of Mobile Anonymous Microblogging},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1578--1591},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2541633},
  doi          = {10.1109/TIFS.2016.2541633},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SenftlebenBBH0T16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShenZGM16,
  author       = {Chao Shen and
                  Yong Zhang and
                  Xiaohong Guan and
                  Roy A. Maxion},
  title        = {Performance Analysis of Touch-Interaction Behavior for Active Smartphone
                  Authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {3},
  pages        = {498--513},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2503258},
  doi          = {10.1109/TIFS.2015.2503258},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShenZGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShojaAWD16,
  author       = {Mohammad Reza Khalili Shoja and
                  George Traian Amariucai and
                  Shuangqing Wei and
                  Jing Deng},
  title        = {Secret Common Randomness From Routing Metadata in Ad Hoc Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1674--1684},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2550424},
  doi          = {10.1109/TIFS.2016.2550424},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShojaAWD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShuZYF16,
  author       = {Xiaokui Shu and
                  Jing Zhang and
                  Danfeng (Daphne) Yao and
                  Wu{-}chun Feng},
  title        = {Fast Detection of Transformed Data Leaks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {3},
  pages        = {528--542},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2503271},
  doi          = {10.1109/TIFS.2015.2503271},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShuZYF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SitovaSYPZGB16,
  author       = {Zdenka Sitova and
                  Jaroslav Sedenka and
                  Qing Yang and
                  Ge Peng and
                  Gang Zhou and
                  Paolo Gasti and
                  Kiran S. Balagani},
  title        = {{HMOG:} New Behavioral Biometric Features for Continuous Authentication
                  of Smartphone Users},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {877--892},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2506542},
  doi          = {10.1109/TIFS.2015.2506542},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SitovaSYPZGB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SongZL16,
  author       = {Tianlong Song and
                  Kai Zhou and
                  Tongtong Li},
  title        = {{CDMA} System Design and Capacity Analysis Under Disguised Jamming},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2487--2498},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2585089},
  doi          = {10.1109/TIFS.2016.2585089},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SongZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunNST16,
  author       = {Yunlian Sun and
                  Kamal Nasrollahi and
                  Zhenan Sun and
                  Tieniu Tan},
  title        = {Complementary Cohort Strategy for Multimodal Face Pair Matching},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {937--950},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2512561},
  doi          = {10.1109/TIFS.2015.2512561},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SunNST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TahaY16,
  author       = {Kamal Taha and
                  Paul D. Yoo},
  title        = {{SIIMCO:} {A} Forensic Investigation Tool for Identifying the Influential
                  Members of a Criminal Organization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {811--822},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2510826},
  doi          = {10.1109/TIFS.2015.2510826},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TahaY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangLLH16,
  author       = {Weixuan Tang and
                  Haodong Li and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Adaptive Steganalysis Based on Embedding Probabilities of Pixels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {734--745},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2507159},
  doi          = {10.1109/TIFS.2015.2507159},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TangLLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangZLZ16,
  author       = {Zhenjun Tang and
                  Xianquan Zhang and
                  Xianxian Li and
                  Shichao Zhang},
  title        = {Robust Image Hashing With Ring Partition and Invariant Vector Distance},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {1},
  pages        = {200--214},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2485163},
  doi          = {10.1109/TIFS.2015.2485163},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TangZLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TapiaPB16,
  author       = {Juan E. Tapia and
                  Claudio A. Perez and
                  Kevin W. Bowyer},
  title        = {Gender Classification From the Same Iris Code Used for Recognition},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1760--1770},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2550418},
  doi          = {10.1109/TIFS.2016.2550418},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TapiaPB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TkachenkoPDSGG16,
  author       = {Iuliia Tkachenko and
                  William Puech and
                  Christophe Destruel and
                  Olivier Strauss and
                  Jean{-}Marc Gaudin and
                  Christian Guichard},
  title        = {Two-Level {QR} Code for Private Message Sharing and Document Authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {3},
  pages        = {571--583},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2506546},
  doi          = {10.1109/TIFS.2015.2506546},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TkachenkoPDSGG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TongZ16,
  author       = {Wei Tong and
                  Sheng Zhong},
  title        = {A Unified Resource Allocation Framework for Defending Against Pollution
                  Attacks in Wireless Network Coding Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2255--2267},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2581313},
  doi          = {10.1109/TIFS.2016.2581313},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TongZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TongaonkarS16,
  author       = {Alok Tongaonkar and
                  R. Sekar},
  title        = {Condition Factorization: {A} Technique for Building Fast and Compact
                  Packet Matching Automata},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {3},
  pages        = {468--483},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2489182},
  doi          = {10.1109/TIFS.2015.2489182},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TongaonkarS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangHT16,
  author       = {Huaqun Wang and
                  Debiao He and
                  Shaohua Tang},
  title        = {Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity
                  Checking in Public Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1165--1176},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2520886},
  doi          = {10.1109/TIFS.2016.2520886},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangLDZYW16,
  author       = {Bo Wang and
                  Leibo Liu and
                  Chenchen Deng and
                  Min Zhu and
                  Shouyi Yin and
                  Shaojun Wei},
  title        = {Against Double Fault Attacks: Injection Effort Model, Space and Time
                  Randomization Based Countermeasures for Reconfigurable Array Architecture},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1151--1164},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2518130},
  doi          = {10.1109/TIFS.2016.2518130},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangLDZYW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangLLCYX16,
  author       = {Shulan Wang and
                  Kaitai Liang and
                  Joseph K. Liu and
                  Jianyong Chen and
                  Jianping Yu and
                  Weixin Xie},
  title        = {Attribute-Based Data Sharing Scheme Revisited in Cloud Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1661--1673},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2549004},
  doi          = {10.1109/TIFS.2016.2549004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangLLCYX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangLW16,
  author       = {Boyang Wang and
                  Ming Li and
                  Haitao Wang},
  title        = {Geometric Range Search on Encrypted Spatial Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {704--719},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2506145},
  doi          = {10.1109/TIFS.2015.2506145},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangMC16,
  author       = {Xiaofen Wang and
                  Yi Mu and
                  Rongmao Chen},
  title        = {One-Round Privacy-Preserving Meeting Location Determination for Smartphone
                  Applications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1712--1721},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2549508},
  doi          = {10.1109/TIFS.2016.2549508},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangMC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangNCY16,
  author       = {Yuhao Wang and
                  Leibin Ni and
                  Chip{-}Hong Chang and
                  Hao Yu},
  title        = {{DW-AES:} {A} Domain-Wall Nanowire-Based {AES} for High Throughput
                  and Energy-Efficient Data Encryption in Non-Volatile Memory},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2426--2440},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2576903},
  doi          = {10.1109/TIFS.2016.2576903},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangNCY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangNZLN16,
  author       = {Xu Wang and
                  Wei Ni and
                  Kangfeng Zheng and
                  Ren Ping Liu and
                  Xinxin Niu},
  title        = {Virus Propagation Modeling and Convergence Analysis in Large-Scale
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2241--2254},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2581305},
  doi          = {10.1109/TIFS.2016.2581305},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangNZLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangSPZR16,
  author       = {Wenhao Wang and
                  Zhi Sun and
                  Sixu Piao and
                  Bocheng Zhu and
                  Kui Ren},
  title        = {Wireless Physical-Layer Identification: Modeling and Validation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {2091--2106},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2552146},
  doi          = {10.1109/TIFS.2016.2552146},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangSPZR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangTL16,
  author       = {Wei Wang and
                  Kah Chan Teh and
                  Kwok Hung Li},
  title        = {Relay Selection for Secure Successive {AF} Relaying Networks With
                  Untrusted Nodes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2466--2476},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2584006},
  doi          = {10.1109/TIFS.2016.2584006},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangTL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangZLYCX16,
  author       = {Shulan Wang and
                  Junwei Zhou and
                  Joseph K. Liu and
                  Jianping Yu and
                  Jianyong Chen and
                  Weixin Xie},
  title        = {An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud
                  Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1265--1277},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2523941},
  doi          = {10.1109/TIFS.2016.2523941},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangZLYCX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WerghiTBB16,
  author       = {Naoufel Werghi and
                  Claudio Tortorici and
                  Stefano Berretti and
                  Alberto Del Bimbo},
  title        = {Boosting 3D LBP-Based Face Recognition by Fusing Shape and Texture
                  Descriptors on the Mesh},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {964--979},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2515505},
  doi          = {10.1109/TIFS.2016.2515505},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WerghiTBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuYLX16,
  author       = {Xiaofu Wu and
                  Zhen Yang and
                  Cong Ling and
                  Xiang{-}Gen Xia},
  title        = {Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic
                  Security},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1278--1290},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2524514},
  doi          = {10.1109/TIFS.2016.2524514},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WuYLX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaWZQSR16,
  author       = {Zhihua Xia and
                  Xinhui Wang and
                  Liangao Zhang and
                  Zhan Qin and
                  Xingming Sun and
                  Kui Ren},
  title        = {A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval
                  Scheme in Cloud Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2594--2608},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2590944},
  doi          = {10.1109/TIFS.2016.2590944},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XiaWZQSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiangGL16,
  author       = {Tao Xiang and
                  Shangwei Guo and
                  Xiaoguo Li},
  title        = {Perceptual Visual Security Index Based on Edge and Texture Similarities},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {951--963},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2515503},
  doi          = {10.1109/TIFS.2016.2515503},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XiangGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiongLLGH16,
  author       = {Qi Xiong and
                  Ying{-}Chang Liang and
                  Kwok Hung Li and
                  Yi Gong and
                  Shiying Han},
  title        = {Secure Transmission Against Pilot Spoofing Attack: {A} Two-Way Training-Based
                  Scheme},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {1017--1026},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2516825},
  doi          = {10.1109/TIFS.2016.2516825},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XiongLLGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuCDDL16,
  author       = {Peng Xu and
                  Kanapathippillai Cumanan and
                  Zhiguo Ding and
                  Xuchu Dai and
                  Kin K. Leung},
  title        = {Group Secret Key Generation in Wireless Networks: Algorithms and Rate
                  Optimization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1831--1846},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2553643},
  doi          = {10.1109/TIFS.2016.2553643},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuCDDL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuDDK16,
  author       = {Peng Xu and
                  Zhiguo Ding and
                  Xuchu Dai and
                  George K. Karagiannidis},
  title        = {Simultaneously Generating Secret and Private Keys in a Cooperative
                  Pairwise-Independent Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1139--1150},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2516970},
  doi          = {10.1109/TIFS.2016.2516970},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuDDK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuHYZC16,
  author       = {Xiaoming Xu and
                  Biao He and
                  Weiwei Yang and
                  Xiangyun Zhou and
                  Yueming Cai},
  title        = {Secure Transmission Design for Cognitive Radio Networks With Poisson
                  Distributed Eavesdroppers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {2},
  pages        = {373--387},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2500178},
  doi          = {10.1109/TIFS.2015.2500178},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/XuHYZC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuLD16,
  author       = {Ke Xu and
                  Yingjiu Li and
                  Robert H. Deng},
  title        = {ICCDetector: ICC-Based Malware Detection on Android},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1252--1264},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2523912},
  doi          = {10.1109/TIFS.2016.2523912},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuLD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YanPY16,
  author       = {Cai{-}Ping Yan and
                  Chi{-}Man Pun and
                  Xiaochen Yuan},
  title        = {Quaternion-Based Image Hashing for Adaptive Tampering Localization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2664--2677},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2594136},
  doi          = {10.1109/TIFS.2016.2594136},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YanPY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YanZJ0LH16,
  author       = {Qiben Yan and
                  Huacheng Zeng and
                  Tingting Jiang and
                  Ming Li and
                  Wenjing Lou and
                  Yiwei Thomas Hou},
  title        = {Jamming Resilient Communication Using {MIMO} Interference Cancellation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1486--1499},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2535906},
  doi          = {10.1109/TIFS.2016.2535906},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YanZJ0LH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangM16,
  author       = {Yang Yang and
                  Maode Ma},
  title        = {Conjunctive Keyword Search With Designated Tester and Timing Enabled
                  Proxy Re-Encryption Function for E-Health Clouds},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {746--759},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2509912},
  doi          = {10.1109/TIFS.2015.2509912},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YeJ16,
  author       = {Qiaolin Ye and
                  Jiajia Jing},
  title        = {Comments on "Joint Global and Local Structure Discriminant Analysis"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {2},
  pages        = {426--428},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2490624},
  doi          = {10.1109/TIFS.2015.2490624},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YeJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YiPBX16,
  author       = {Xun Yi and
                  Russell Paulet and
                  Elisa Bertino and
                  Guandong Xu},
  title        = {Private Cell Retrieval From Data Warehouses},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1346--1361},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2527620},
  doi          = {10.1109/TIFS.2016.2527620},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YiPBX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuLNYMS16,
  author       = {Yong Yu and
                  Yannan Li and
                  Jianbing Ni and
                  Guomin Yang and
                  Yi Mu and
                  Willy Susilo},
  title        = {Comments on "Public Integrity Auditing for Dynamic Data Sharing With
                  Multiuser Modification"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {3},
  pages        = {658--659},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2501728},
  doi          = {10.1109/TIFS.2015.2501728},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YuLNYMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuRW16,
  author       = {Jia Yu and
                  Kui Ren and
                  Cong Wang},
  title        = {Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key
                  Updates},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1362--1375},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2528500},
  doi          = {10.1109/TIFS.2016.2528500},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YuRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZandiAT16,
  author       = {Mohsen Zandi and
                  Ahmad Mahmoudi Aznaveh and
                  Alireza Talebpour},
  title        = {Iterative Copy-Move Forgery Detection Based on a New Interest Point
                  Detector},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2499--2512},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2585118},
  doi          = {10.1109/TIFS.2016.2585118},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZandiAT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZeitouniOWKS16,
  author       = {Shaza Zeitouni and
                  Yossef Oren and
                  Christian Wachsmann and
                  Patrick Koeberl and
                  Ahmad{-}Reza Sadeghi},
  title        = {Remanence Decay Side-Channel: The {PUF} Case},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1106--1116},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2512534},
  doi          = {10.1109/TIFS.2015.2512534},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZeitouniOWKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangCZ16,
  author       = {Yuan Zhang and
                  Qingjun Chen and
                  Sheng Zhong},
  title        = {Privacy-Preserving Data Aggregation in Mobile Phone Sensing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {980--992},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2515513},
  doi          = {10.1109/TIFS.2016.2515513},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangGZWYSG16,
  author       = {Fan Zhang and
                  Shize Guo and
                  Xinjie Zhao and
                  Tao Wang and
                  Jian Yang and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Dawu Gu},
  title        = {A Framework for the Analysis and Evaluation of Algebraic Fault Attacks
                  on Lightweight Block Ciphers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {1039--1054},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2516905},
  doi          = {10.1109/TIFS.2016.2516905},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangGZWYSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangL16,
  author       = {Meng Zhang and
                  Yuan Liu},
  title        = {Energy Harvesting for Physical-Layer Security in {OFDMA} Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {1},
  pages        = {154--162},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2481797},
  doi          = {10.1109/TIFS.2015.2481797},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangQ16,
  author       = {Jiliang Zhang and
                  Gang Qu},
  title        = {Rebuttal to "Comments on 'A {PUF-FSM} Binding Scheme for {FPGA} {IP}
                  Protection and Pay-Per-Device Licensing"'},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2626--2627},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2553443},
  doi          = {10.1109/TIFS.2016.2553443},
  timestamp    = {Tue, 14 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangTZ16,
  author       = {Yuan Zhang and
                  Wei Tong and
                  Sheng Zhong},
  title        = {On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms
                  for k-Anonymity Location Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2528--2541},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2587241},
  doi          = {10.1109/TIFS.2016.2587241},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangWDZ16,
  author       = {Jingwen Zhang and
                  Fanggang Wang and
                  Octavia A. Dobre and
                  Zhangdui Zhong},
  title        = {Specific Emitter Identification via Hilbert-Huang Transform in Single-Hop
                  and Relaying Scenarios},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1192--1205},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2520908},
  doi          = {10.1109/TIFS.2016.2520908},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangWDZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangWJSA16,
  author       = {Mengyuan Zhang and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal and
                  Massimiliano Albanese},
  title        = {Network Diversity: {A} Security Metric for Evaluating the Resilience
                  of Networks Against Zero-Day Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {1071--1086},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2516916},
  doi          = {10.1109/TIFS.2016.2516916},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangWJSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangWSH16,
  author       = {Hang Zhang and
                  Tianyu Wang and
                  Lingyang Song and
                  Zhu Han},
  title        = {Interference Improves {PHY} Security for Cognitive Radio Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {3},
  pages        = {609--620},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2500184},
  doi          = {10.1109/TIFS.2015.2500184},
  timestamp    = {Tue, 03 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangWSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangYG016,
  author       = {Yuan Zhang and
                  Min Yang and
                  Guofei Gu and
                  Hao Chen},
  title        = {Rethinking Permission Enforcement Mechanism on Mobile Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2227--2240},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2581304},
  doi          = {10.1109/TIFS.2016.2581304},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangYG016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangYWJWZ16,
  author       = {Jun Zhang and
                  Chau Yuen and
                  Chao{-}Kai Wen and
                  Shi Jin and
                  Kai{-}Kit Wong and
                  Hongbo Zhu},
  title        = {Large System Secrecy Rate Analysis for {SWIPT} {MIMO} Wiretap Channels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {1},
  pages        = {74--85},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2477050},
  doi          = {10.1109/TIFS.2015.2477050},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangYWJWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZTZ16,
  author       = {Yuan Zhang and
                  He Zhang and
                  Siyuan Tang and
                  Sheng Zhong},
  title        = {Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue
                  Guarantees},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {1},
  pages        = {100--113},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2478739},
  doi          = {10.1109/TIFS.2015.2478739},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangZTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoCWM16,
  author       = {Hong Zhao and
                  Yifan Chen and
                  Rui Wang and
                  Hafiz Malik},
  title        = {Anti-Forensics of Environmental-Signature-Based Audio Splicing Detection
                  and Its Countermeasure via Rich-Features Classification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1603--1617},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2543205},
  doi          = {10.1109/TIFS.2016.2543205},
  timestamp    = {Mon, 17 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaoCWM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhaoM16,
  author       = {Lianying Zhao and
                  Mohammad Mannan},
  title        = {Deceptive Deletion Triggers Under Coercion},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2763--2776},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2598523},
  doi          = {10.1109/TIFS.2016.2598523},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhaoM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengKP16,
  author       = {Qian Zheng and
                  Ajay Kumar and
                  Gang Pan},
  title        = {Suspecting Less and Doing Better: New Insights on Palmprint Identification
                  for Faster and More Accurate Matching},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {3},
  pages        = {633--641},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2503265},
  doi          = {10.1109/TIFS.2015.2503265},
  timestamp    = {Mon, 02 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhengKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuC16,
  author       = {Xinglei Zhu and
                  Chang Wen Chen},
  title        = {A Joint Source-Channel Adaptive Scheme for Wireless {H.264/AVC} Video
                  Authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {1},
  pages        = {141--153},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2481366},
  doi          = {10.1109/TIFS.2015.2481366},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuL16,
  author       = {Wen Tao Zhu and
                  Jingqiang Lin},
  title        = {Generating Correlated Digital Certificates: Framework and Applications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1117--1127},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2516818},
  doi          = {10.1109/TIFS.2016.2516818},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuLMSG16,
  author       = {Yu Zhu and
                  Yan Li and
                  Guowang Mu and
                  Shiguang Shan and
                  Guodong Guo},
  title        = {Still-to-Video Face Matching Using Multiple Geodesic Flows},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2866--2875},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2601060},
  doi          = {10.1109/TIFS.2016.2601060},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuLMSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Zivari-FardAAA16,
  author       = {Hassan Zivari{-}Fard and
                  Bahareh Akhbari and
                  Mahmoud Ahmadian{-}Attari and
                  Mohammad Reza Aref},
  title        = {Imperfect and Perfect Secrecy in Compound Multiple Access Channel
                  With Confidential Message},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {6},
  pages        = {1239--1251},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2523813},
  doi          = {10.1109/TIFS.2016.2523813},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Zivari-FardAAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}