Skip to contents

  1. Ardagna, Claudio A. [Editor]; Zhou, Jiangying [Other] ; International Federation for Information Processing Working Group on Pervasive System Security, WISTP 5 2011 Heraklion

    Information security theory and practice : security and privacy of mobile devices in wireless communication ; 5th IFIP WG 11.2 international workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011 ; proceedings

    Books
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Berlin; Heidelberg [u.a.]: Springer, 2011

    Published in: Lecture notes in computer science ; 6633

  2. Jøsang, Audun [Editor]; Maseng, Torleiv [Other]; Knapskog, Svein Johan [Other] ; Nordic Conference on Secure IT Systems 14 2009 Oslo

    Identity and privacy in the internet age : 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009 ; proceedings

    Books
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Berlin; Heidelberg [u.a.]: Springer, 2009

    Published in: Lecture notes in computer science ; 5838

  3. Naccache, David [Author] ; Sauveron, Damien [Editor]

    Information Security Theory and Practice. Securing the Internet of Things : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 – July 2, 2014. Proceedings

    Books
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Berlin, Heidelberg: Springer, 2014

    Published in: Lecture notes in computer science ; 8501

  4. Clark, John A. [Other]; Brooke, Phillip J. [Other]; Paige, Richard F. [Other]; Polack, Fiona A.C [Other]

    Security in Pervasive Computing (vol. # 3934) : Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings

    Books
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Berlin, Heidelberg: Springer Berlin Heidelberg, 2006

    Published in: Lecture notes in computer science ; 3934