Claudio Agostino Ardagna; Ernesto Damiani; Leszek A. Maciaszek; Michele Missikoff; Michael Parkin Springer-Verlag Berlin and Heidelberg GmbH & Co. KG (2012) Pehmeäkantinen kirja
Pierangela Samarati; Moti Yung; Fabio Martinelli; Claudio Agostino Ardagna Springer-Verlag Berlin and Heidelberg GmbH & Co. KG (2009) Pehmeäkantinen kirja
Christophe Debruyne; Hervé Panetto; Robert Meersman; Tharam Dillon; Georg Weichhart; Yuan An; Claudio Agostino Ardagna Springer International Publishing AG (2015) Pehmeäkantinen kirja
Christophe Debruyne; Hervé Panetto; Robert Meersman; Tharam Dillon; eva Kühn; Declan O'Sullivan; Claudio Agostino Ardagna Springer International Publishing AG (2016) Pehmeäkantinen kirja
Hervé Panetto; Christophe Debruyne; Walid Gaaloul; Mike Papazoglou; Adrian Paschke; Claudio Agostino Ardagna; Ro Meersman Springer International Publishing AG (2017) Pehmeäkantinen kirja
Hervé Panetto; Christophe Debruyne; Walid Gaaloul; Mike Papazoglou; Adrian Paschke; Claudio Agostino Ardagna; Ro Meersman Springer International Publishing AG (2017) Pehmeäkantinen kirja
Hervé Panetto; Christophe Debruyne; Henderik A. Proper; Claudio Agostino Ardagna; Dumitru Roman; Robert Meersman Springer Nature Switzerland AG (2018) Pehmeäkantinen kirja
Hervé Panetto; Christophe Debruyne; Henderik A. Proper; Claudio Agostino Ardagna; Dumitru Roman; Robert Meersman Springer Nature Switzerland AG (2018) Pehmeäkantinen kirja
Hervé Panetto; Christophe Debruyne; Martin Hepp; Dave Lewis; Claudio Agostino Ardagna; Robert Meersman Springer Nature Switzerland AG (2019) Pehmeäkantinen kirja
This volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2011, held in Heraklion, Crete, Greece, in June 2011. The 19 revised full papers and 8 short papers presented together with a keynote speech were carefully reviewed and selected from 80 submissions. They are organized in topical sections on mobile authentication and access control, lightweight authentication, algorithms, hardware implementation, security and cryptography, security attacks and measures, security attacks, security and trust, and mobile application security and privacy.