IEEE Security & Privacy
IEEE Security & Privacy > 2015 > 13 > 6 > 16 - 17
IEEE Security & Privacy > 2015 > 13 > 6 > 11
IEEE Security & Privacy > 2015 > 13 > 6 > c2
IEEE Security & Privacy > 2015 > 13 > 6 > 77 - 81
IEEE Security & Privacy > 2015 > 13 > 6 > 72 - 76
IEEE Security & Privacy > 2015 > 13 > 6 > 82 - 84
IEEE Security & Privacy > 2015 > 13 > 6 > 1 - 2
IEEE Security & Privacy > 2015 > 13 > 6 > 3 - 10
IEEE Security & Privacy > 2015 > 13 > 6 > 44 - 50
IEEE Security & Privacy > 2015 > 13 > 6 > c1
IEEE Security & Privacy > 2015 > 13 > 6 > 52 - 59
IEEE Security & Privacy > 2015 > 13 > 6 > 66 - 70
IEEE Security & Privacy > 2015 > 13 > 6 > c4
IEEE Security & Privacy > 2015 > 13 > 6 > 22 - 28
IEEE Security & Privacy > 2015 > 13 > 6 > 96
IEEE Security & Privacy > 2015 > 13 > 6 > 38 - 43
IEEE Security & Privacy > 2015 > 13 > 6 > 12 - 15
IEEE Security & Privacy > 2015 > 13 > 6 > 60 - 65