Wyniki wyszukiwania
Computing in Science & Engineering > 2017 > 19 > 1 > 46 - 53
IEEE Security & Privacy > 2017 > 15 > 4 > 79 - 84
IEEE Security & Privacy > 2017 > 15 > 1 > 75 - 79
IEEE Security & Privacy > 2016 > 14 > 5 > 14 - 21
IT Professional > 2016 > 18 > 5 > 34 - 40
IEEE Security & Privacy > 2015 > 13 > 1 > 12 - 13
IEEE Security & Privacy > 2014 > 12 > 5 > 86 - 89
IEEE Security & Privacy > 2014 > 12 > 4 > 14 - 21
IEEE Internet Computing > 2013 > 17 > 3 > 18 - 25
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 973 - 984
IEEE Security & Privacy > 2013 > 11 > 1 > 15 - 22
IEEE Internet Computing > 2013 > 17 > 3 > 6 - 9
IEEE Security & Privacy > 2012 > 10 > 1 > 28 - 36
IEEE Security & Privacy > 2012 > 10 > 1 > 37 - 45
IEEE Security & Privacy > 2012 > 10 > 6 > 26 - 35
IEEE Security & Privacy > 2012 > 10 > 1 > 19 - 21
IEEE Security & Privacy > 2012 > 10 > 1 > 80 - 83
IEEE Internet Computing > 2011 > 15 > 6 > 80 - 84
Proceedings of the IEEE > 2011 > 99 > 2 > 328 - 329