IEEE Security & Privacy
IEEE Security & Privacy > 2015 > 13 > 1 > 22 - 29
IEEE Security & Privacy > 2015 > 13 > 1 > 49 - 56
IEEE Security & Privacy > 2015 > 13 > 1 > 77 - 79
IEEE Security & Privacy > 2015 > 13 > 1 > 7 - 11
IEEE Security & Privacy > 2015 > 13 > 1 > 57 - 60
IEEE Security & Privacy > 2015 > 13 > 1 > 71 - 76
IEEE Security & Privacy > 2015 > 13 > 1 > 14 - 21
IEEE Security & Privacy > 2015 > 13 > 1 > 61 - 65
IEEE Security & Privacy > 2015 > 13 > 1 > 80
IEEE Security & Privacy > 2015 > 13 > 1 > 12 - 13
IEEE Security & Privacy > 2015 > 13 > 1 > 41 - 48
IEEE Security & Privacy > 2015 > 13 > 1 > 3 - 5
IEEE Security & Privacy > 2015 > 13 > 2 > 22 - 29
IEEE Security & Privacy > 2015 > 13 > 2 > 84 - 88
IEEE Security & Privacy > 2015 > 13 > 2 > 99 - 102
IEEE Security & Privacy > 2015 > 13 > 2 > 65 - 74
IEEE Security & Privacy > 2015 > 13 > 2 > 3 - 5
IEEE Security & Privacy > 2015 > 13 > 2 > 108
IEEE Security & Privacy > 2015 > 13 > 2 > 94 - 98
IEEE Security & Privacy > 2015 > 13 > 2 > 48 - 55