IEEE Security & Privacy
IEEE Security & Privacy > 2010 > 8 > 1 > 50 - 52
IEEE Security & Privacy > 2010 > 8 > 1 > 77 - 80
IEEE Security & Privacy > 2010 > 8 > 1 > 56 - 59
IEEE Security & Privacy > 2010 > 8 > 1 > 64 - 67
IEEE Security & Privacy > 2010 > 8 > 1 > 43 - 49
IEEE Security & Privacy > 2010 > 8 > 1 > 53 - 55
IEEE Security & Privacy > 2010 > 8 > 1 > 72 - 76
IEEE Security & Privacy > 2010 > 8 > 1 > 60 - 63
IEEE Security & Privacy > 2010 > 8 > 1 > 81 - 85
IEEE Security & Privacy > 2010 > 8 > 1 > 88
IEEE Security & Privacy > 2010 > 8 > 1 > 86 - 87
IEEE Security & Privacy > 2010 > 8 > 1 > 28 - 35
IEEE Security & Privacy > 2010 > 8 > 2 > 35 - 44
IEEE Security & Privacy > 2010 > 8 > 2 > 5 - 7
IEEE Security & Privacy > 2010 > 8 > 2 > 11 - 12
IEEE Security & Privacy > 2010 > 8 > 2 > 76 - 78
IEEE Security & Privacy > 2010 > 8 > 3 > 3
IEEE Security & Privacy > 2010 > 8 > 3 > 36 - 44
IEEE Security & Privacy > 2010 > 8 > 3 > 14 - 20
IEEE Security & Privacy > 2010 > 8 > 3 > 68 - 69