IEEE Security & Privacy
IEEE Security & Privacy > 2015 > 13 > 1 > 22 - 29
IEEE Security & Privacy > 2015 > 13 > 1 > 49 - 56
IEEE Security & Privacy > 2015 > 13 > 1 > 66 - 70
IEEE Security & Privacy > 2015 > 13 > 1 > 30 - 40
IEEE Security & Privacy > 2015 > 13 > 1 > 57 - 60
IEEE Security & Privacy > 2015 > 13 > 1 > 14 - 21
IEEE Security & Privacy > 2015 > 13 > 1 > 61 - 65
IEEE Security & Privacy > 2015 > 13 > 1 > 12 - 13
IEEE Security & Privacy > 2015 > 13 > 2 > 22 - 29
IEEE Security & Privacy > 2015 > 13 > 2 > 14 - 21
IEEE Security & Privacy > 2015 > 13 > 2 > 103 - 107
IEEE Security & Privacy > 2015 > 13 > 2 > 12 - 13
IEEE Security & Privacy > 2015 > 13 > 2 > 7 - 10
IEEE Security & Privacy > 2015 > 13 > 2 > 56 - 64
IEEE Security & Privacy > 2015 > 13 > 3 > 59 - 62
IEEE Security & Privacy > 2015 > 13 > 3 > 9 - 15
IEEE Security & Privacy > 2015 > 13 > 3 > 3 - 4
IEEE Security & Privacy > 2015 > 13 > 3 > 88 - 91
IEEE Security & Privacy > 2015 > 13 > 3 > 16 - 23
IEEE Security & Privacy > 2015 > 13 > 3 > 5 - 7