<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alessandro Armando</style></author><author><style face="normal" font="default" size="100%">Gabriele Costa</style></author><author><style face="normal" font="default" size="100%">Alessio Merlo</style></author><author><style face="normal" font="default" size="100%">Luca Verderame</style></author><author><style face="normal" font="default" size="100%">Konrad Wrona</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Developing a NATO BYOD Security Policy</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Military Communications and Information System, ICMCIS</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">23-24 May 2016</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Brussels, Belgium</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alessandro Armando</style></author><author><style face="normal" font="default" size="100%">Gabriele Costa</style></author><author><style face="normal" font="default" size="100%">Alessio Merlo</style></author><author><style face="normal" font="default" size="100%">Luca Verderame</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Enabling BYOD Through Secure Meta-market</style></title><secondary-title><style face="normal" font="default" size="100%">2014 ACM Conference on Security and Privacy in Wireless &amp; Mobile Networks, WiSec’14</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">23-25 July 2014</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Oxford, United Kingdom</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alessandro Armando</style></author><author><style face="normal" font="default" size="100%">Gabriele Costa</style></author><author><style face="normal" font="default" size="100%">Alessio Merlo</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Bring Your Own Device, Securely</style></title><secondary-title><style face="normal" font="default" size="100%">28th Annual ACM Symposium on Applied Computing, SAC’13</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">18-22 March 2013</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Coimbra, Portugal</style></pub-location><pages><style face="normal" font="default" size="100%">1852–1858</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>