IEEE Security & Privacy
IEEE Security & Privacy > 2009 > 7 > 1 > 14 - 17
IEEE Security & Privacy > 2009 > 7 > 1 > 26 - 33
IEEE Security & Privacy > 2009 > 7 > 1 > 18 - 25
IEEE Security & Privacy > 2009 > 7 > 1 > 42 - 48
IEEE Security & Privacy > 2009 > 7 > 1 > 50 - 57
IEEE Security & Privacy > 2009 > 7 > 1 > 82 - 85
IEEE Security & Privacy > 2009 > 7 > 2 > 45 - 48
IEEE Security & Privacy > 2009 > 7 > 2 > 75 - 78
IEEE Security & Privacy > 2009 > 7 > 2 > 71 - 74
IEEE Security & Privacy > 2009 > 7 > 2 > 49 - 55
IEEE Security & Privacy > 2009 > 7 > 2 > 38 - 44
IEEE Security & Privacy > 2009 > 7 > 2 > 67 - 70
IEEE Security & Privacy > 2009 > 7 > 2 > 87 - 90
IEEE Security & Privacy > 2009 > 7 > 3 > 75 - 77
IEEE Security & Privacy > 2009 > 7 > 3 > 29 - 36
IEEE Security & Privacy > 2009 > 7 > 3 > 78 - 81
IEEE Security & Privacy > 2009 > 7 > 3 > 64 - 67
IEEE Security & Privacy > 2009 > 7 > 3 > 53 - 56
IEEE Security & Privacy > 2009 > 7 > 3 > 57 - 59