Search Results for - Narrowed by: SpringerLink (Online service) - Information storage and retrieval systems. - Management of Computing and Information Systems.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dSUBJECT$002509Subject$002509Information$002bstorage$002band$002bretrieval$002bsystems.$002509Information$002bstorage$002band$002bretrieval$002bsystems.$0026qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026ps$003d300?2024-06-20T17:23:07ZInformation Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5034812024-06-20T17:23:07Z2024-06-20T17:23:07Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format: Electronic Resources<br/>Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036132024-06-20T17:23:07Z2024-06-20T17:23:07Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85259-9">http://dx.doi.org/10.1007/978-3-540-85259-9</a><br/>Format: Electronic Resources<br/>Business Process Management 6th International Conference, BPM 2008, Milan, Italy, September 2-4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036502024-06-20T17:23:07Z2024-06-20T17:23:07Zby Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85758-7">http://dx.doi.org/10.1007/978-3-540-85758-7</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data and Processes Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake City, UT, USA, June 17-18, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5038462024-06-20T17:23:07Z2024-06-20T17:23:07Zby Freire, Juliana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89965-5">http://dx.doi.org/10.1007/978-3-540-89965-5</a><br/>Format: Electronic Resources<br/>Managing Large-Scale Service Deployment 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036782024-06-20T17:23:07Z2024-06-20T17:23:07Zby Turck, Filip. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87353-2">http://dx.doi.org/10.1007/978-3-540-87353-2</a><br/>Format: Electronic Resources<br/>Software Technologies for Embedded and Ubiquitous Systems 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037192024-06-20T17:23:07Z2024-06-20T17:23:07Zby Brinkschulte, Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87785-1">http://dx.doi.org/10.1007/978-3-540-87785-1</a><br/>Format: Electronic Resources<br/>Service Availability 5th International Service Availability Symposium, ISAS 2008 Tokyo, Japan, May 19-21, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026202024-06-20T17:23:07Z2024-06-20T17:23:07Zby Nanya, Takashi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68129-8">http://dx.doi.org/10.1007/978-3-540-68129-8</a><br/>Format: Electronic Resources<br/>Resilient Networks and Services Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028182024-06-20T17:23:07Z2024-06-20T17:23:07Zby Hausheer, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70587-1">http://dx.doi.org/10.1007/978-3-540-70587-1</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028272024-06-20T17:23:07Z2024-06-20T17:23:07Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format: Electronic Resources<br/>Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038392024-06-20T17:23:07Z2024-06-20T17:23:07Zby Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027562024-06-20T17:23:07Z2024-06-20T17:23:07Zby Mjølsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69485-4">http://dx.doi.org/10.1007/978-3-540-69485-4</a><br/>Format: Electronic Resources<br/>Advanced Methods for Inconsistent Knowledge Managementent://SD_ILS/0/SD_ILS:5024342024-06-20T17:23:07Z2024-06-20T17:23:07Zby Nguyen, Ngoc Thanh. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-889-0">http://dx.doi.org/10.1007/978-1-84628-889-0</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papersent://SD_ILS/0/SD_ILS:5129222024-06-20T17:23:07Z2024-06-20T17:23:07Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format: Electronic Resources<br/>Software Technologies for Embedded and Ubiquitous Systems 5th IFIP WG 10.2 International Workshop, SEUS 2007, Santorini Island, Greece, May 2007. Revised Papersent://SD_ILS/0/SD_ILS:5129282024-06-20T17:23:07Z2024-06-20T17:23:07Zby Obermaisser, Roman. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75664-4">http://dx.doi.org/10.1007/978-3-540-75664-4</a><br/>Format: Electronic Resources<br/>Business Process Management 5th International Conference, BPM 2007, Brisbane, Australia, September 24-28, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128802024-06-20T17:23:07Z2024-06-20T17:23:07Zby Alonso, Gustavo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75183-0">http://dx.doi.org/10.1007/978-3-540-75183-0</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5128882024-06-20T17:23:07Z2024-06-20T17:23:07Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">http://dx.doi.org/10.1007/978-3-540-75227-1</a><br/>Format: Electronic Resources<br/>Service Availability 4th International Service Availability Symposium, ISAS 2007, Durham, NH, USA, May 21-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125282024-06-20T17:23:07Z2024-06-20T17:23:07Zby Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72736-1">http://dx.doi.org/10.1007/978-3-540-72736-1</a><br/>Format: Electronic Resources<br/>Active Networks IFIP TC6 6th International Working Conference, IWAN 2004, Lawrence, KS, USA, October 27-29, 2004. Revised Papersent://SD_ILS/0/SD_ILS:5123522024-06-20T17:23:07Z2024-06-20T17:23:07Zby Minden, Gary J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71500-9">http://dx.doi.org/10.1007/978-3-540-71500-9</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5123622024-06-20T17:23:07Z2024-06-20T17:23:07Zby Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71549-8">http://dx.doi.org/10.1007/978-3-540-71549-8</a><br/>Format: Electronic Resources<br/>Inter-Domain Management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125722024-06-20T17:23:07Z2024-06-20T17:23:07Zby Bandara, Arosha K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72986-0">http://dx.doi.org/10.1007/978-3-540-72986-0</a><br/>Format: Electronic Resources<br/>Computational Intelligence and Security International Conference, CIS 2006. Guangzhou, China, November 3-6, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:5127822024-06-20T17:23:07Z2024-06-20T17:23:07Zby Wang, Yuping. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74377-4">http://dx.doi.org/10.1007/978-3-540-74377-4</a><br/>Format: Electronic Resources<br/>Secure Data Management 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128892024-06-20T17:23:07Z2024-06-20T17:23:07Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75248-6">http://dx.doi.org/10.1007/978-3-540-75248-6</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124402024-06-20T17:23:07Z2024-06-20T17:23:07Zby Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format: Electronic Resources<br/>EC2ND 2006 Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Faculty of Advanced Technology, University of Glamorgan, Wales, UKent://SD_ILS/0/SD_ILS:5086642024-06-20T17:23:07Z2024-06-20T17:23:07Zby Blyth, Andrew. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-750-3">http://dx.doi.org/10.1007/978-1-84628-750-3</a><br/>Format: Electronic Resources<br/>Preserving Digital Informationent://SD_ILS/0/SD_ILS:5115792024-06-20T17:23:07Z2024-06-20T17:23:07Zby Gladney, Henry M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-37887-7">http://dx.doi.org/10.1007/978-3-540-37887-7</a><br/>Format: Electronic Resources<br/>Business Information Systems 10th International Conference, BIS 2007, Poznan, Poland, April 25-27, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124292024-06-20T17:23:07Z2024-06-20T17:23:07Zby Abramowicz, Witold. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72035-5">http://dx.doi.org/10.1007/978-3-540-72035-5</a><br/>Format: Electronic Resources<br/>Business Intelligence for the Real-Time Enterprises First International Workshop, BIRTE 2006, Seoul, Korea, September 11, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5127392024-06-20T17:23:07Z2024-06-20T17:23:07Zby Bussler, Christoph. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73950-0">http://dx.doi.org/10.1007/978-3-540-73950-0</a><br/>Format: Electronic Resources<br/>Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130072024-06-20T17:23:07Z2024-06-20T17:23:07Zby McDaniel, Patrick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format: Electronic Resources<br/>IP Operations and Management 7th IEEE International Workshop, IPOM 2007 San José, USA, October 31 - November 2, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129422024-06-20T17:23:07Z2024-06-20T17:23:07Zby Medhi, Deep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75853-2">http://dx.doi.org/10.1007/978-3-540-75853-2</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126602024-06-20T17:23:07Z2024-06-20T17:23:07Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73408-6">http://dx.doi.org/10.1007/978-3-540-73408-6</a><br/>Format: Electronic Resources<br/>Service Availability Third International Service Availability Symposium, ISAS 2006, Helsinki, Finland, May 15-16, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:5120932024-06-20T17:23:07Z2024-06-20T17:23:07Zby Penkler, Dave. editor.<br/><a href="http://dx.doi.org/10.1007/11955498">http://dx.doi.org/10.1007/11955498</a><br/>Format: Electronic Resources<br/>Business Process Management Workshops BPM 2006 International Workshops, BPD, BPI, ENEI, GPWW, DPM, semantics4ws, Vienna, Austria, September 4-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116022024-06-20T17:23:07Z2024-06-20T17:23:07Zby Eder, Johann. editor.<br/><a href="http://dx.doi.org/10.1007/11837862">http://dx.doi.org/10.1007/11837862</a><br/>Format: Electronic Resources<br/>Business Process Management Workshops BPM 2005 International Workshops, BPI, BPD, ENEI, BPRM, WSCOBPM, BPS, Nancy, France, September 5, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5107092024-06-20T17:23:07Z2024-06-20T17:23:07Zby Bussler, Christoph J. editor.<br/><a href="http://dx.doi.org/10.1007/11678564">http://dx.doi.org/10.1007/11678564</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5109182024-06-20T17:23:07Z2024-06-20T17:23:07Zby Chen, Hsinchun. editor.<br/><a href="http://dx.doi.org/10.1007/11734628">http://dx.doi.org/10.1007/11734628</a><br/>Format: Electronic Resources<br/>Trust Management 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5110902024-06-20T17:23:07Z2024-06-20T17:23:07Zby Stølen, Ketil. editor.<br/><a href="http://dx.doi.org/10.1007/11755593">http://dx.doi.org/10.1007/11755593</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006. Proceedings, Part Ient://SD_ILS/0/SD_ILS:5118122024-06-20T17:23:07Z2024-06-20T17:23:07Zby Gabrys, Bogdan. editor.<br/><a href="http://dx.doi.org/10.1007/11892960">http://dx.doi.org/10.1007/11892960</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006. Proceedings, Part IIent://SD_ILS/0/SD_ILS:5118132024-06-20T17:23:07Z2024-06-20T17:23:07Zby Gabrys, Bogdan. editor.<br/><a href="http://dx.doi.org/10.1007/11893004">http://dx.doi.org/10.1007/11893004</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006. Proceedings, Part IIIent://SD_ILS/0/SD_ILS:5118142024-06-20T17:23:07Z2024-06-20T17:23:07Zby Gabrys, Bogdan. editor.<br/><a href="http://dx.doi.org/10.1007/11893011">http://dx.doi.org/10.1007/11893011</a><br/>Format: Electronic Resources<br/>Designing Smart Homes The Role of Artificial Intelligenceent://SD_ILS/0/SD_ILS:5113412024-06-20T17:23:07Z2024-06-20T17:23:07Zby Augusto, Juan Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/11788485">http://dx.doi.org/10.1007/11788485</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5112442024-06-20T17:23:07Z2024-06-20T17:23:07Zby Atzeni, Andrea S. editor.<br/><a href="http://dx.doi.org/10.1007/11774716">http://dx.doi.org/10.1007/11774716</a><br/>Format: Electronic Resources<br/>EC2ND 2005 Proceedings of the First European Conference on Computer Network Defence School of Computing, University of Glamorgan, Wales, UKent://SD_ILS/0/SD_ILS:5085312024-06-20T17:23:07Z2024-06-20T17:23:07Zby Blyth, Andrew. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-352-3">http://dx.doi.org/10.1007/1-84628-352-3</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5108252024-06-20T17:23:07Z2024-06-20T17:23:07Zby Chen, Kefei. editor.<br/><a href="http://dx.doi.org/10.1007/11689522">http://dx.doi.org/10.1007/11689522</a><br/>Format: Electronic Resources<br/>Business Process Management 4th International Conference, BPM 2006, Vienna, Austria, September 5-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116232024-06-20T17:23:07Z2024-06-20T17:23:07Zby Dustdar, Schahram. editor.<br/><a href="http://dx.doi.org/10.1007/11841760">http://dx.doi.org/10.1007/11841760</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5112082024-06-20T17:23:07Z2024-06-20T17:23:07Zby Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11767831">http://dx.doi.org/10.1007/11767831</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust Thrid International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5107202024-06-20T17:23:07Z2024-06-20T17:23:07Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/11679219">http://dx.doi.org/10.1007/11679219</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5121072024-06-20T17:23:07Z2024-06-20T17:23:07Zby Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11957454">http://dx.doi.org/10.1007/11957454</a><br/>Format: Electronic Resources<br/>Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5121252024-06-20T17:23:07Z2024-06-20T17:23:07Zby Bagchi, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format: Electronic Resources<br/>Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5117712024-06-20T17:23:07Z2024-06-20T17:23:07Zby Breveglieri, Luca. editor.<br/><a href="http://dx.doi.org/10.1007/11889700">http://dx.doi.org/10.1007/11889700</a><br/>Format: Electronic Resources<br/>Autonomic Principles of IP Operations and Management 6th IEEE International Workshop on IP Operations and Management, IPOM 2006, Dublin, Ireland, October 23-25, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118532024-06-20T17:23:07Z2024-06-20T17:23:07Zby Parr, Gerard. editor.<br/><a href="http://dx.doi.org/10.1007/11908852">http://dx.doi.org/10.1007/11908852</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data International Provenance and Annotation Workshop, IPAW 2006, Chicago, IL, USA, May 3-5, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5117812024-06-20T17:23:07Z2024-06-20T17:23:07Zby Moreau, Luc. editor.<br/><a href="http://dx.doi.org/10.1007/11890850">http://dx.doi.org/10.1007/11890850</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111372024-06-20T17:23:07Z2024-06-20T17:23:07Zby Mehrotra, Sharad. editor.<br/><a href="http://dx.doi.org/10.1007/11760146">http://dx.doi.org/10.1007/11760146</a><br/>Format: Electronic Resources<br/>Secure Data Management Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116252024-06-20T17:23:07Z2024-06-20T17:23:07Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11844662">http://dx.doi.org/10.1007/11844662</a><br/>Format: Electronic Resources<br/>Computer Network Securityent://SD_ILS/0/SD_ILS:5043732024-06-20T17:23:07Z2024-06-20T17:23:07Zby Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format: Electronic Resources<br/>Computational Intelligence and Security International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5100752024-06-20T17:23:07Z2024-06-20T17:23:07Zby Hao, Yue. editor.<br/><a href="http://dx.doi.org/10.1007/11596981">http://dx.doi.org/10.1007/11596981</a><br/>Format: Electronic Resources<br/>Computational Intelligence and Security International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings Part Ient://SD_ILS/0/SD_ILS:5100762024-06-20T17:23:07Z2024-06-20T17:23:07Zby Hao, Yue. editor.<br/><a href="http://dx.doi.org/10.1007/11596448">http://dx.doi.org/10.1007/11596448</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104242024-06-20T17:23:07Z2024-06-20T17:23:07Zby Kantor, Paul. editor.<br/><a href="http://dx.doi.org/10.1007/b136511">http://dx.doi.org/10.1007/b136511</a><br/>Format: Electronic Resources<br/>Quality of Service – IWQoS 2005 13th International Workshop, IWQoS 2005, Passau, Germany, June 21-23, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101142024-06-20T17:23:07Z2024-06-20T17:23:07Zby Meer, Hermann. editor.<br/><a href="http://dx.doi.org/10.1007/b137286">http://dx.doi.org/10.1007/b137286</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5103312024-06-20T17:23:07Z2024-06-20T17:23:07Zby Martin, David. editor.<br/><a href="http://dx.doi.org/10.1007/b136164">http://dx.doi.org/10.1007/b136164</a><br/>Format: Electronic Resources<br/>Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5106482024-06-20T17:23:07Z2024-06-20T17:23:07Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format: Electronic Resources<br/>Intuitive Human Interfaces for Organizing and Accessing Intellectual Assets International Workshop, Dagstuhl Castle, Germany, March 1-5, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5105552024-06-20T17:23:07Z2024-06-20T17:23:07Zby Grieser, Gunter. editor.<br/><a href="http://dx.doi.org/10.1007/b104697">http://dx.doi.org/10.1007/b104697</a><br/>Format: Electronic Resources<br/>Business Process Management 3rd International Conference, BPM 2005, Nancy, France, September 5-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103012024-06-20T17:23:07Z2024-06-20T17:23:07Zby Aalst, Wil M. P. editor.<br/><a href="http://dx.doi.org/10.1007/11538394">http://dx.doi.org/10.1007/11538394</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5100632024-06-20T17:23:07Z2024-06-20T17:23:07Zby Chadwick, David. editor.<br/><a href="http://dx.doi.org/10.1007/11533733">http://dx.doi.org/10.1007/11533733</a><br/>Format: Electronic Resources<br/>Quality of Service in Multiservice IP Networks Third International Workshop, QoS-IP 2005, Catania, Italy, February 2-4, 2004, Catania, Italy, February 2-4, 2004. Proceedingsent://SD_ILS/0/SD_ILS:5097512024-06-20T17:23:07Z2024-06-20T17:23:07Zby Ajmone Marsan, Marco. editor.<br/><a href="http://dx.doi.org/10.1007/b105169">http://dx.doi.org/10.1007/b105169</a><br/>Format: Electronic Resources<br/>Service Availability First International Service Availability Symposium, ISAS 2004, Munich, Germany, May 13-14, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5096842024-06-20T17:23:07Z2024-06-20T17:23:07Zby Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/b105309">http://dx.doi.org/10.1007/b105309</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103492024-06-20T17:23:07Z2024-06-20T17:23:07Zby Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:5103602024-06-20T17:23:07Z2024-06-20T17:23:07Zby Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11553939">http://dx.doi.org/10.1007/11553939</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part IVent://SD_ILS/0/SD_ILS:5103632024-06-20T17:23:07Z2024-06-20T17:23:07Zby Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11554028">http://dx.doi.org/10.1007/11554028</a><br/>Format: Electronic Resources<br/>Trust Management Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104032024-06-20T17:23:07Z2024-06-20T17:23:07Zby Herrmann, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/b136639">http://dx.doi.org/10.1007/b136639</a><br/>Format: Electronic Resources<br/>Operations and Management in IP-Based Networks 5th IEEE International Workshop on IP Operations and Management, IPOM 2005, Barcelona, Spain, October 26-28, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104562024-06-20T17:23:07Z2024-06-20T17:23:07Zby Magedanz, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/11567486">http://dx.doi.org/10.1007/11567486</a><br/>Format: Electronic Resources<br/>Service Availability Second International Service Availability Symposium, ISAS 2005, Berlin, Germany, April 25 – 26, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5103832024-06-20T17:23:07Z2024-06-20T17:23:07Zby Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/11560333">http://dx.doi.org/10.1007/11560333</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5100202024-06-20T17:23:07Z2024-06-20T17:23:07Zby Ioannidis, John. editor.<br/><a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format: Electronic Resources<br/>Secure Data Management Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103442024-06-20T17:23:07Z2024-06-20T17:23:07Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11552338">http://dx.doi.org/10.1007/11552338</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part Ient://SD_ILS/0/SD_ILS:5103532024-06-20T17:23:07Z2024-06-20T17:23:07Zby Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11552413">http://dx.doi.org/10.1007/11552413</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5103562024-06-20T17:23:07Z2024-06-20T17:23:07Zby Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11552451">http://dx.doi.org/10.1007/11552451</a><br/>Format: Electronic Resources<br/>