IEEE Security & Privacy
IEEE Security & Privacy > 2004 > 2 > 3 > 26 - 27
IEEE Security & Privacy > 2004 > 2 > 3 > 40 - 48
IEEE Security & Privacy > 2004 > 2 > 3 > 96
IEEE Security & Privacy > 2004 > 2 > 3 > 49 - 55
IEEE Security & Privacy > 2004 > 2 > 5 > 5
IEEE Security & Privacy > 2004 > 2 > 5 > 16 - 18
IEEE Security & Privacy > 2004 > 2 > 5 > 48 - 55
IEEE Security & Privacy > 2004 > 2 > 5 > 40 - 47
IEEE Security & Privacy > 2004 > 2 > 5 > 32 - 39
IEEE Security & Privacy > 2004 > 2 > 5 > 25 - 31
IEEE Security & Privacy > 2004 > 2 > 5 > 61 - 63
IEEE Security & Privacy > 2005 > 3 > 1 > 40 - 44
IEEE Security & Privacy > 2005 > 3 > 1 > 74 - 77
IEEE Security & Privacy > 2005 > 3 > 1 > 45 - 50
IEEE Security & Privacy > 2006 > 4 > 2 > 68 - 71
IEEE Security & Privacy > 2006 > 4 > 2 > 30 - 38
IEEE Security & Privacy > 2006 > 4 > 2 > 84 - 87
IEEE Security & Privacy > 2006 > 4 > 3 > 29 - 36
IEEE Security & Privacy > 2006 > 4 > 3 > 80 - 83
IEEE Security & Privacy > 2006 > 4 > 4 > 84 - 87