IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing > 2011 > 8 > 5 > 670 - 684
IEEE Transactions on Dependable and Secure Computing > 2011 > 8 > 5 > 777 - 782
IEEE Transactions on Dependable and Secure Computing > 2011 > 8 > 5 > 685 - 698
IEEE Transactions on Dependable and Secure Computing > 2011 > 8 > 5 > 656 - 669
IEEE Transactions on Dependable and Secure Computing > 2011 > 8 > 5 > 640 - 655
IEEE Transactions on Dependable and Secure Computing > 2011 > 8 > 5 > 625 - 639
IEEE Transactions on Dependable and Secure Computing > 2011 > 8 > 6 > 866 - 882
IEEE Transactions on Dependable and Secure Computing > 2011 > 8 > 6 > 810 - 823
IEEE Transactions on Dependable and Secure Computing > 2011 > 8 > 6 > 785 - 797
IEEE Transactions on Dependable and Secure Computing > 2011 > 8 > 6 > 929 - 937
IEEE Transactions on Dependable and Secure Computing > 2011 > 8 > 6 > 798 - 809
IEEE Transactions on Dependable and Secure Computing > 2011 > 8 > 6 > 913 - 928
IEEE Transactions on Dependable and Secure Computing > 2011 > 8 > 6 > 852 - 865
IEEE Transactions on Dependable and Secure Computing > 2011 > 8 > 6 > 824 - 838
IEEE Transactions on Dependable and Secure Computing > 2011 > 8 > 6 > 938 - 943
IEEE Transactions on Dependable and Secure Computing > 2011 > 8 > 6 > 898 - 912
IEEE Transactions on Dependable and Secure Computing > 2011 > 8 > 6 > 883 - 897