IEEE Security & Privacy
IEEE Security & Privacy > 2012 > 10 > 1 > 37 - 45
IEEE Security & Privacy > 2012 > 10 > 1 > 91 - 93
IEEE Security & Privacy > 2012 > 10 > 2 > 97 - 101
IEEE Security & Privacy > 2012 > 10 > 2 > 40 - 49
IEEE Security & Privacy > 2012 > 10 > 3 > 88 - 92
IEEE Security & Privacy > 2012 > 10 > 3 > 64 - 71
IEEE Security & Privacy > 2013 > 11 > 1 > 54 - 61
IEEE Security & Privacy > 2013 > 11 > 1 > 15 - 22
IEEE Security & Privacy > 2013 > 11 > 1 > 44 - 53
IEEE Security & Privacy > 2014 > 12 > 1 > 28 - 38
IEEE Security & Privacy > 2014 > 12 > 1 > 6 - 8
IEEE Security & Privacy > 2014 > 12 > 1 > 73 - 76
IEEE Security & Privacy > 2014 > 12 > 3 > 82 - 84
IEEE Security & Privacy > 2014 > 12 > 3 > 78 - 81
IEEE Security & Privacy > 2014 > 12 > 6 > 108
IEEE Security & Privacy > 2015 > 13 > 2 > 22 - 29
IEEE Security & Privacy > 2015 > 13 > 3 > 88 - 91
IEEE Security & Privacy > 2015 > 13 > 5 > 99 - 103
IEEE Security & Privacy > 2015 > 13 > 5 > 24 - 32
IEEE Security & Privacy > 2015 > 13 > 5 > 96 - 98