IEEE Security & Privacy
IEEE Security & Privacy > 2008 > 6 > 1 > 68 - 70
IEEE Security & Privacy > 2008 > 6 > 1 > 81 - 83
IEEE Security & Privacy > 2009 > 7 > 1 > 3
IEEE Security & Privacy > 2009 > 7 > 2 > 10 - 14
IEEE Security & Privacy > 2009 > 7 > 2 > 67 - 70
IEEE Security & Privacy > 2009 > 7 > 3 > 53 - 56
IEEE Security & Privacy > 2009 > 7 > 3 > 11 - 12
IEEE Security & Privacy > 2010 > 8 > 2 > 20 - 27
IEEE Security & Privacy > 2010 > 8 > 2 > 73 - 75
IEEE Security & Privacy > 2010 > 8 > 2 > 86 - 87
IEEE Security & Privacy > 2010 > 8 > 3 > 54 - 55
IEEE Security & Privacy > 2010 > 8 > 4 > 58 - 61
IEEE Security & Privacy > 2011 > 9 > 3 > 56 - 59
IEEE Security & Privacy > 2011 > 9 > 3 > 70 - 72
IEEE Security & Privacy > 2011 > 9 > 3 > 9 - 14
IEEE Security & Privacy > 2011 > 9 > 4 > 48 - 51
IEEE Security & Privacy > 2011 > 9 > 4 > 88
IEEE Security & Privacy > 2011 > 9 > 5 > 16 - 22
IEEE Security & Privacy > 2012 > 10 > 2 > 54 - 59