1
by Samarati, Pierangela
Published 2004
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

2
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... Security -- A2M: Access-Assured Mobile Desktop Computing -- Automated Spyware Collection and Analysis...

3
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Security Analysis of Mobile Phones Used as OTP Generators -- An Energy-Efficient Symmetric...

4
Published 2000
Springer US
Table of Contents: ... for Internet Trading in Mobile Computing Environments -- Providing Security and Interoperation of Heterogeneous...

5
Published 2004
Springer US
Table of Contents: ... -- Invited Talk - Towards Semantics-Aware Access Control -- System Security Analysis -- RBAC/MAC Security...

6
Published 2023
Springer Nature Switzerland
Table of Contents: ..., Prediction, and Recommendation using Process Mining Techniques -- Security and Cryptography -- A...

7
Published 2023
Springer Nature Switzerland
Table of Contents: ...SPOT+: Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over...