IEEE Security & Privacy
IEEE Security & Privacy > 2015 > 13 > 1 > 22 - 29
IEEE Security & Privacy > 2015 > 13 > 1 > 49 - 56
IEEE Security & Privacy > 2015 > 13 > 1 > 77 - 79
IEEE Security & Privacy > 2015 > 13 > 1 > 7 - 11
IEEE Security & Privacy > 2015 > 13 > 1 > 57 - 60
IEEE Security & Privacy > 2015 > 13 > 1 > 71 - 76
IEEE Security & Privacy > 2015 > 13 > 1 > 61 - 65
IEEE Security & Privacy > 2015 > 13 > 1 > 12 - 13
IEEE Security & Privacy > 2015 > 13 > 1 > 41 - 48
IEEE Security & Privacy > 2015 > 13 > 2 > 22 - 29
IEEE Security & Privacy > 2015 > 13 > 2 > 75 - 80
IEEE Security & Privacy > 2015 > 13 > 2 > 84 - 88
IEEE Security & Privacy > 2015 > 13 > 2 > 38 - 46
IEEE Security & Privacy > 2015 > 13 > 2 > 94 - 98
IEEE Security & Privacy > 2015 > 13 > 2 > 48 - 55
IEEE Security & Privacy > 2015 > 13 > 2 > 103 - 107
IEEE Security & Privacy > 2015 > 13 > 2 > 30 - 37
IEEE Security & Privacy > 2015 > 13 > 2 > 56 - 64
IEEE Security & Privacy > 2015 > 13 > 3 > 84 - 86
IEEE Security & Privacy > 2015 > 13 > 3 > 74 - 79