With the rapid development of information technologies and the transition to next-generation networks, computer systems and in particular embedded s- tems are b
This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Smart Devices,
Organizations are increasingly relying on electronic information to conduct business, which has caused the amount of personal information to grow exponentially.
This book constitutes the refereed proceedings of the Third International Conference on Wireless, Mobile Networks, WiMo 2011, and of The Third International Con