Securing the 'Bring your own device' paradigm. Armando, A., Costa, G., Verderame, L., & Merlo, A. Computer, 47(6):48-56, 2014.
Paper doi bibtex @ARTICLE{Armando201448,
author={Armando, A., Costa, G., Verderame, L., Merlo, A.},
title={Securing the 'Bring your own device' paradigm},
journal={Computer},
year={2014},
volume={47},
number={6},
pages={48-56},
doi={10.1109/MC.2014.164},
art_number={6838866},
url={https://www.scopus.com/inward/record.uri?eid=2-s2.0-84903127070&partnerID=40&md5=43d0c57d7dcea57ed6c50ecad960fc11},
document_type={Article},
source={Scopus},
}
Downloads: 0
{"_id":"q6ony5mKi7qPE2GTc","bibbaseid":"armando-costa-verderame-merlo-securingthebringyourowndeviceparadigm-2014","downloads":0,"creationDate":"2016-08-26T09:24:46.711Z","title":"Securing the 'Bring your own device' paradigm","author_short":["Armando, A.","Costa, G.","Verderame, L.","Merlo, A."],"year":2014,"bibtype":"article","biburl":"https://dl.dropboxusercontent.com/u/1703583/BiblioLab.bib","bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Armando"],"firstnames":["A."],"suffixes":[]},{"propositions":[],"lastnames":["Costa"],"firstnames":["G."],"suffixes":[]},{"propositions":[],"lastnames":["Verderame"],"firstnames":["L."],"suffixes":[]},{"propositions":[],"lastnames":["Merlo"],"firstnames":["A."],"suffixes":[]}],"title":"Securing the 'Bring your own device' paradigm","journal":"Computer","year":"2014","volume":"47","number":"6","pages":"48-56","doi":"10.1109/MC.2014.164","art_number":"6838866","url":"https://www.scopus.com/inward/record.uri?eid=2-s2.0-84903127070&partnerID=40&md5=43d0c57d7dcea57ed6c50ecad960fc11","document_type":"Article","source":"Scopus","bibtex":"@ARTICLE{Armando201448,\nauthor={Armando, A., Costa, G., Verderame, L., Merlo, A.},\ntitle={Securing the 'Bring your own device' paradigm},\njournal={Computer},\nyear={2014},\nvolume={47},\nnumber={6},\npages={48-56},\ndoi={10.1109/MC.2014.164},\nart_number={6838866},\nurl={https://www.scopus.com/inward/record.uri?eid=2-s2.0-84903127070&partnerID=40&md5=43d0c57d7dcea57ed6c50ecad960fc11},\ndocument_type={Article},\nsource={Scopus},\n}\n\n","author_short":["Armando, A.","Costa, G.","Verderame, L.","Merlo, A."],"key":"Armando201448","id":"Armando201448","bibbaseid":"armando-costa-verderame-merlo-securingthebringyourowndeviceparadigm-2014","role":"author","urls":{"Paper":"https://www.scopus.com/inward/record.uri?eid=2-s2.0-84903127070&partnerID=40&md5=43d0c57d7dcea57ed6c50ecad960fc11"},"downloads":0},"search_terms":["securing","bring","device","paradigm","armando","costa","verderame","merlo"],"keywords":["dblp"],"authorIDs":["57c00b7c5abfdd4d540000cb"],"dataSources":["EQov9rEvkmMf5P4ah"]}