Search Results for - Narrowed by: E-Book - Computer science. - Data Structures, Cryptology and Information Theory. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dITYPE$002509Material$002bType$0025091$00253AE-BOOKS$002509E-Book$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026ps$003d300? 2024-09-25T23:48:50Z Handbook of Biometrics ent://SD_ILS/0/SD_ILS:501662 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Jain, Anil K. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-71041-9">http://dx.doi.org/10.1007/978-0-387-71041-9</a><br/>Format:&#160;Electronic Resources<br/> Security for Telecommunications Networks ent://SD_ILS/0/SD_ILS:501699 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Traynor, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format:&#160;Electronic Resources<br/> Securing Biometrics Applications ent://SD_ILS/0/SD_ILS:501652 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-69933-2">http://dx.doi.org/10.1007/978-0-387-69933-2</a><br/>Format:&#160;Electronic Resources<br/> Preferences and Similarities ent://SD_ILS/0/SD_ILS:502575 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Riccia, Giacomo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-211-85432-7">http://dx.doi.org/10.1007/978-3-211-85432-7</a><br/>Format:&#160;Electronic Resources<br/> Policies and Research in Identity Management First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007 ent://SD_ILS/0/SD_ILS:501939 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Leeuw, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77996-6">http://dx.doi.org/10.1007/978-0-387-77996-6</a><br/>Format:&#160;Electronic Resources<br/> Vulnerability Analysis and Defense for the Internet ent://SD_ILS/0/SD_ILS:501787 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Singh, Abhishek. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format:&#160;Electronic Resources<br/> Botnet Detection Countering the Largest Security Threat ent://SD_ILS/0/SD_ILS:501627 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Lee, Wenke. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format:&#160;Electronic Resources<br/> Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503670 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Goodall, John R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85933-8">http://dx.doi.org/10.1007/978-3-540-85933-8</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection Systems ent://SD_ILS/0/SD_ILS:501910 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Mancini, Luigi V. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format:&#160;Electronic Resources<br/> The Burrows-Wheeler Transform: Data Compression, Suffix Arrays, and Pattern Matching ent://SD_ILS/0/SD_ILS:501978 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Adjeroh, Donald. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-78909-5">http://dx.doi.org/10.1007/978-0-387-78909-5</a><br/>Format:&#160;Electronic Resources<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:501690 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Mayes, Keith E. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format:&#160;Electronic Resources<br/> Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway ent://SD_ILS/0/SD_ILS:501518 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Karabulut, Y&uuml;cel. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09428-1">http://dx.doi.org/10.1007/978-0-387-09428-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Ad Hoc Networking Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25&ndash;27, 2008 ent://SD_ILS/0/SD_ILS:501523 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Cuenca, Pedro. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09490-8">http://dx.doi.org/10.1007/978-0-387-09490-8</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Database Security Applications and Trends ent://SD_ILS/0/SD_ILS:501583 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Gertz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format:&#160;Electronic Resources<br/> Cryptanalytic Attacks on RSA ent://SD_ILS/0/SD_ILS:501584 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format:&#160;Electronic Resources<br/> Insider Attack and Cyber Security Beyond the Hacker ent://SD_ILS/0/SD_ILS:501913 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Stolfo, Salvatore J. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection II ent://SD_ILS/0/SD_ILS:502009 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Papa, Mauricio. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-88523-0">http://dx.doi.org/10.1007/978-0-387-88523-0</a><br/>Format:&#160;Electronic Resources<br/> New Stream Cipher Designs The eSTREAM Finalists ent://SD_ILS/0/SD_ILS:502639 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68351-3">http://dx.doi.org/10.1007/978-3-540-68351-3</a><br/>Format:&#160;Electronic Resources<br/> Automata, Languages and Programming 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part I ent://SD_ILS/0/SD_ILS:502815 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Aceto, Luca. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70575-8">http://dx.doi.org/10.1007/978-3-540-70575-8</a><br/>Format:&#160;Electronic Resources<br/> Automata, Languages and Programming 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II ent://SD_ILS/0/SD_ILS:502816 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Aceto, Luca. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70583-3">http://dx.doi.org/10.1007/978-3-540-70583-3</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedings ent://SD_ILS/0/SD_ILS:503859 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92238-4">http://dx.doi.org/10.1007/978-3-540-92238-4</a><br/>Format:&#160;Electronic Resources<br/> A Concise Introduction to Data Compression ent://SD_ILS/0/SD_ILS:502480 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-072-8">http://dx.doi.org/10.1007/978-1-84800-072-8</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:502855 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71039-4">http://dx.doi.org/10.1007/978-3-540-71039-4</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503767 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format:&#160;Electronic Resources<br/> VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Security ent://SD_ILS/0/SD_ILS:503340 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Goodall, John R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78243-8">http://dx.doi.org/10.1007/978-3-540-78243-8</a><br/>Format:&#160;Electronic Resources<br/> Network and Parallel Computing IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503740 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Cao, Jian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88140-7">http://dx.doi.org/10.1007/978-3-540-88140-7</a><br/>Format:&#160;Electronic Resources<br/> Mathematical Methods in Computer Science Essays in Memory of Thomas Beth ent://SD_ILS/0/SD_ILS:503849 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Calmet, Jacques. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89994-5">http://dx.doi.org/10.1007/978-3-540-89994-5</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunication Networks Third International Conference, ICETE 2006, Set&uacute;bal, Portugal, August 7-10, 2006. Selected Papers ent://SD_ILS/0/SD_ILS:502831 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Filipe, Joaquim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70760-8">http://dx.doi.org/10.1007/978-3-540-70760-8</a><br/>Format:&#160;Electronic Resources<br/> Pairing-Based Cryptography &ndash; Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503633 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Galbraith, Steven D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85538-5">http://dx.doi.org/10.1007/978-3-540-85538-5</a><br/>Format:&#160;Electronic Resources<br/> ISSE/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe/SECURE 2007 Conference ent://SD_ILS/0/SD_ILS:513342 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Pohlmann, Norbert. author.<br/><a href="http://dx.doi.org/10.1007/978-3-8348-9418-2">http://dx.doi.org/10.1007/978-3-8348-9418-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer Science &ndash; ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512989 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Cervesato, Iliano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513042 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Okada, Mitsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77505-8">http://dx.doi.org/10.1007/978-3-540-77505-8</a><br/>Format:&#160;Electronic Resources<br/> Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512931 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Susilo, Willy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75670-5">http://dx.doi.org/10.1007/978-3-540-75670-5</a><br/>Format:&#160;Electronic Resources<br/> Reliable Face Recognition Methods System Design, Impementation and Evaluation ent://SD_ILS/0/SD_ILS:505522 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Wechsler, Harry. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-38464-1">http://dx.doi.org/10.1007/978-0-387-38464-1</a><br/>Format:&#160;Electronic Resources<br/> Synchronizing Internet Protocol Security (SIPSec) ent://SD_ILS/0/SD_ILS:505814 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format:&#160;Electronic Resources<br/> Security for Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:505628 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Liu, Donggang. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Respecting Intrusion Detection ent://SD_ILS/0/SD_ILS:505789 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Flegel, Ulrich. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format:&#160;Electronic Resources<br/> Online Business Security Systems ent://SD_ILS/0/SD_ILS:505832 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Williams, Godfried B. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management in Decentralized Systems ent://SD_ILS/0/SD_ILS:504690 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Yu, Ting. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format:&#160;Electronic Resources<br/> Practical Internet Security ent://SD_ILS/0/SD_ILS:504952 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Vacca, John R. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29844-3">http://dx.doi.org/10.1007/978-0-387-29844-3</a><br/>Format:&#160;Electronic Resources<br/> Data Warehousing and Data Mining Techniques for Cyber Security ent://SD_ILS/0/SD_ILS:505647 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Singhal, Anoop. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format:&#160;Electronic Resources<br/> Automata, Languages and Programming 34th International Colloquium, ICALP 2007, Wrocław, Poland, July 9-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512663 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Arge, Lars. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73420-8">http://dx.doi.org/10.1007/978-3-540-73420-8</a><br/>Format:&#160;Electronic Resources<br/> Security with Noisy Data On Private Biometrics, Secure Key Storage and Anti-Counterfeiting ent://SD_ILS/0/SD_ILS:508723 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Tuyls, Pim. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-984-2">http://dx.doi.org/10.1007/978-1-84628-984-2</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Trust in Modern Data Management ent://SD_ILS/0/SD_ILS:512193 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Petković, Milan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69861-6">http://dx.doi.org/10.1007/978-3-540-69861-6</a><br/>Format:&#160;Electronic Resources<br/> Formal Correctness of Security Protocols With 62 Figures and 4 Tables ent://SD_ILS/0/SD_ILS:512052 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Bella, Giampaolo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:511946 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format:&#160;Electronic Resources<br/> E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers ent://SD_ILS/0/SD_ILS:512950 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Filipe, Joaquim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75993-5">http://dx.doi.org/10.1007/978-3-540-75993-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information Processing and Protection ent://SD_ILS/0/SD_ILS:506014 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73137-7">http://dx.doi.org/10.1007/978-0-387-73137-7</a><br/>Format:&#160;Electronic Resources<br/> Preserving Privacy in On-Line Analytical Processing (OLAP) ent://SD_ILS/0/SD_ILS:505611 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Wang, Lingyu. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46274-5">http://dx.doi.org/10.1007/978-0-387-46274-5</a><br/>Format:&#160;Electronic Resources<br/> Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks ent://SD_ILS/0/SD_ILS:505612 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Poovendran, Radha. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format:&#160;Electronic Resources<br/> Oracle Database 11g New Features for DBAs and Developers ent://SD_ILS/0/SD_ILS:508009 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Alapati, Sam R. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-0469-5">http://dx.doi.org/10.1007/978-1-4302-0469-5</a><br/>Format:&#160;Electronic Resources<br/> Exploratory Data Analysis Using Fisher Information ent://SD_ILS/0/SD_ILS:508679 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Frieden, B. Roy. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-777-0">http://dx.doi.org/10.1007/978-1-84628-777-0</a><br/>Format:&#160;Electronic Resources<br/> Electronic Postage Systems Technology, Security, Economics ent://SD_ILS/0/SD_ILS:505571 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Bleumer, Gerrit. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format:&#160;Electronic Resources<br/> Malware Detection ent://SD_ILS/0/SD_ILS:505569 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Christodorescu, Mihai. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format:&#160;Electronic Resources<br/> Network Security Policies and Procedures ent://SD_ILS/0/SD_ILS:505659 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Frye, Douglas W. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format:&#160;Electronic Resources<br/> Power Analysis Attacks Revealing the Secrets of Smart Cards ent://SD_ILS/0/SD_ILS:505504 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Mangard, Stefan. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-38162-6">http://dx.doi.org/10.1007/978-0-387-38162-6</a><br/>Format:&#160;Electronic Resources<br/> ISSE 2006 &mdash; Securing Electronic Busines Processes Highlights of the Information Security Solutions Europe 2006 Conference ent://SD_ILS/0/SD_ILS:513340 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Paulus, Sachar. author.<br/><a href="http://dx.doi.org/10.1007/978-3-8348-9195-2">http://dx.doi.org/10.1007/978-3-8348-9195-2</a><br/>Format:&#160;Electronic Resources<br/> Biometrics, Computer Security Systems and Artificial Intelligence Applications ent://SD_ILS/0/SD_ILS:505426 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Saeed, Khalid. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format:&#160;Electronic Resources<br/> Quality of Protection Security Measurements and Metrics ent://SD_ILS/0/SD_ILS:505432 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Gollmann, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36584-8">http://dx.doi.org/10.1007/978-0-387-36584-8</a><br/>Format:&#160;Electronic Resources<br/> A Classical Introduction to Cryptography Applications for Communications Security ent://SD_ILS/0/SD_ILS:504461 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Vaudenay, Serge. author.<br/><a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format:&#160;Electronic Resources<br/> Understanding Intrusion Detection Through Visualization ent://SD_ILS/0/SD_ILS:504678 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Axelsson, Stefan. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27636-X">http://dx.doi.org/10.1007/0-387-27636-X</a><br/>Format:&#160;Electronic Resources<br/> Access Control Systems Security, Identity Management and Trust Models ent://SD_ILS/0/SD_ILS:504692 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Benantar, Messaoud. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27716-1">http://dx.doi.org/10.1007/0-387-27716-1</a><br/>Format:&#160;Electronic Resources<br/> Algebraic Aspects of the Advanced Encryption Standard ent://SD_ILS/0/SD_ILS:505451 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Cid, Carlos. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36842-9">http://dx.doi.org/10.1007/978-0-387-36842-9</a><br/>Format:&#160;Electronic Resources<br/> Guide to Wireless Network Security ent://SD_ILS/0/SD_ILS:504953 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Vacca, John R. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Computer Security ent://SD_ILS/0/SD_ILS:508525 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format:&#160;Electronic Resources<br/> Concurrent Zero-Knowledge With Additional Background by Oded Goldreich ent://SD_ILS/0/SD_ILS:510794 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Rosen, Alon. author.<br/><a href="http://dx.doi.org/10.1007/3-540-32939-0">http://dx.doi.org/10.1007/3-540-32939-0</a><br/>Format:&#160;Electronic Resources<br/> Automata, Languages and Programming 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part I ent://SD_ILS/0/SD_ILS:511333 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Bugliesi, Michele. editor.<br/><a href="http://dx.doi.org/10.1007/11786986">http://dx.doi.org/10.1007/11786986</a><br/>Format:&#160;Electronic Resources<br/> Automata, Languages and Programming 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II ent://SD_ILS/0/SD_ILS:511334 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Bugliesi, Michele. editor.<br/><a href="http://dx.doi.org/10.1007/11787006">http://dx.doi.org/10.1007/11787006</a><br/>Format:&#160;Electronic Resources<br/> Theoretical Computer Science Essays in Memory of Shimon Even ent://SD_ILS/0/SD_ILS:510783 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Goldreich, Oded. editor.<br/><a href="http://dx.doi.org/10.1007/11685654">http://dx.doi.org/10.1007/11685654</a><br/>Format:&#160;Electronic Resources<br/> Multivariate Public Key Cryptosystems ent://SD_ILS/0/SD_ILS:505464 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Ding, Jintai. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36946-4">http://dx.doi.org/10.1007/978-0-387-36946-4</a><br/>Format:&#160;Electronic Resources<br/> Data Analysis, Classification and the Forward Search Proceedings of the Meeting of the Classification and Data Analysis Group (CLADAG) of the Italian Statistical Society, University of Parma, June 6&ndash;8, 2005 ent://SD_ILS/0/SD_ILS:511337 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Zani, Sergio. editor.<br/><a href="http://dx.doi.org/10.1007/3-540-35978-8">http://dx.doi.org/10.1007/3-540-35978-8</a><br/>Format:&#160;Electronic Resources<br/> General Theory of Information Transfer and Combinatorics ent://SD_ILS/0/SD_ILS:511768 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Ahlswede, Rudolf. editor.<br/><a href="http://dx.doi.org/10.1007/11889342">http://dx.doi.org/10.1007/11889342</a><br/>Format:&#160;Electronic Resources<br/> Developing Ambient Intelligence Proceedings of the First International Conference on Ambient Intelligence Developments (AmID&rsquo;06) ent://SD_ILS/0/SD_ILS:508738 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Ma&ntilde;a, Antonio. author.<br/><a href="http://dx.doi.org/10.1007/978-2-287-47610-5">http://dx.doi.org/10.1007/978-2-287-47610-5</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics for International Security Information Sharing and Data Mining ent://SD_ILS/0/SD_ILS:504985 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Chen, Hsinchun. author.<br/><a href="http://dx.doi.org/10.1007/0-387-30332-4">http://dx.doi.org/10.1007/0-387-30332-4</a><br/>Format:&#160;Electronic Resources<br/> CryptoGraphics Exploiting Graphics Cards for Security ent://SD_ILS/0/SD_ILS:505285 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Cook, Debra L. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format:&#160;Electronic Resources<br/> Unconstrained Face Recognition ent://SD_ILS/0/SD_ILS:504921 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Zhou, Shaohua Kevin. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29486-5">http://dx.doi.org/10.1007/978-0-387-29486-5</a><br/>Format:&#160;Electronic Resources<br/> Human Identification Based on Gait ent://SD_ILS/0/SD_ILS:504923 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Nixon, Mark S. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29488-9">http://dx.doi.org/10.1007/978-0-387-29488-9</a><br/>Format:&#160;Electronic Resources<br/> Privacy Preserving Data Mining ent://SD_ILS/0/SD_ILS:504924 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Vaidya, Jaideep. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29489-6">http://dx.doi.org/10.1007/978-0-387-29489-6</a><br/>Format:&#160;Electronic Resources<br/> Biometric User Authentication for it Security From Fundamentals to Handwriting ent://SD_ILS/0/SD_ILS:504730 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Vielhauer, Claus. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28094-4">http://dx.doi.org/10.1007/0-387-28094-4</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Multibiometrics ent://SD_ILS/0/SD_ILS:505186 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Ross, Arun A. author.<br/><a href="http://dx.doi.org/10.1007/0-387-33123-9">http://dx.doi.org/10.1007/0-387-33123-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Viruses and Malware ent://SD_ILS/0/SD_ILS:505284 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Aycock, John. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format:&#160;Electronic Resources<br/> Hop Integrity in the Internet ent://SD_ILS/0/SD_ILS:504916 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Huang, Chin-Tser. author.<br/><a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format:&#160;Electronic Resources<br/> A Classical Introduction to Cryptography Exercise Book ent://SD_ILS/0/SD_ILS:504837 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Baig&egrave;neres, Thomas. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format:&#160;Electronic Resources<br/> Contemporary Cryptology ent://SD_ILS/0/SD_ILS:513099 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Catalano, Dario. author.<br/><a href="http://dx.doi.org/10.1007/3-7643-7394-6">http://dx.doi.org/10.1007/3-7643-7394-6</a><br/>Format:&#160;Electronic Resources<br/> Codici Cifrati Arne Beurling e la crittografia nella II guerra mondiale ent://SD_ILS/0/SD_ILS:513537 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Beckman, Bengt. author.<br/><a href="http://dx.doi.org/10.1007/88-470-0395-4">http://dx.doi.org/10.1007/88-470-0395-4</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace Security and Defense: Research Issues Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6&ndash;9 September 2004 ent://SD_ILS/0/SD_ILS:506450 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Kowalik, Janusz S. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-3381-8">http://dx.doi.org/10.1007/1-4020-3381-8</a><br/>Format:&#160;Electronic Resources<br/> Evolutionary Multiobjective Optimization Theoretical Advances and Applications ent://SD_ILS/0/SD_ILS:508392 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Abraham, Ajith. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-137-7">http://dx.doi.org/10.1007/1-84628-137-7</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Knowledge-Based Systems Business and Technology in the New Millennium ent://SD_ILS/0/SD_ILS:507682 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Leondes, Cornelius T. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4020-7829-3">http://dx.doi.org/10.1007/978-1-4020-7829-3</a><br/>Format:&#160;Electronic Resources<br/> Secure Group Communications over Data Networks ent://SD_ILS/0/SD_ILS:504082 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Zou, Xukai. author.<br/><a href="http://dx.doi.org/10.1007/b100182">http://dx.doi.org/10.1007/b100182</a><br/>Format:&#160;Electronic Resources<br/> The Austin Protocol Compiler ent://SD_ILS/0/SD_ILS:504121 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;McGuire, Tommy M. author.<br/><a href="http://dx.doi.org/10.1007/b101038">http://dx.doi.org/10.1007/b101038</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15&ndash;18, 2004, Windermere, The Lake District, United Kingdom ent://SD_ILS/0/SD_ILS:504313 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Chadwick, David. editor.<br/><a href="http://dx.doi.org/10.1007/b105674">http://dx.doi.org/10.1007/b105674</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Information Systems V ent://SD_ILS/0/SD_ILS:506262 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Camp, Olivier. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-2673-0">http://dx.doi.org/10.1007/1-4020-2673-0</a><br/>Format:&#160;Electronic Resources<br/> Coding for Data and Computer Communications ent://SD_ILS/0/SD_ILS:504226 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/b102531">http://dx.doi.org/10.1007/b102531</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:504178 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Tilborg, Henk C. A. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format:&#160;Electronic Resources<br/> Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems ent://SD_ILS/0/SD_ILS:504179 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format:&#160;Electronic Resources<br/> Semistructured Database Design ent://SD_ILS/0/SD_ILS:504191 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Ling, Tok Wang. author.<br/><a href="http://dx.doi.org/10.1007/b101873">http://dx.doi.org/10.1007/b101873</a><br/>Format:&#160;Electronic Resources<br/> Algorithmic Learning in a Random World ent://SD_ILS/0/SD_ILS:504342 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Vovk, Vladimir. author.<br/><a href="http://dx.doi.org/10.1007/b106715">http://dx.doi.org/10.1007/b106715</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection and Correlation Challenges and Solutions ent://SD_ILS/0/SD_ILS:504165 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Kruegel, Christopher. author.<br/><a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format:&#160;Electronic Resources<br/> Image and Video Encryption From Digital Rights Management to Secured Personal Communication. ent://SD_ILS/0/SD_ILS:504166 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;SpringerLink (Online service)<br/><a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format:&#160;Electronic Resources<br/> Privacy, Security and Trust within the Context of Pervasive Computing ent://SD_ILS/0/SD_ILS:504171 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Robinson, Philip. editor.<br/><a href="http://dx.doi.org/10.1007/b101573">http://dx.doi.org/10.1007/b101573</a><br/>Format:&#160;Electronic Resources<br/> Computer viruses: from theory to applications ent://SD_ILS/0/SD_ILS:508732 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Filiol, Eric. author.<br/><a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22&ndash;27, 2004, Toulouse, France ent://SD_ILS/0/SD_ILS:504264 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 &ndash; June 1, 2005, Chiba, Japan ent://SD_ILS/0/SD_ILS:504425 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Sasaki, Ryoichi. editor.<br/><a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13&ndash;16, 2005 ent://SD_ILS/0/SD_ILS:505059 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Pollitt, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-31163-7">http://dx.doi.org/10.1007/0-387-31163-7</a><br/>Format:&#160;Electronic Resources<br/> Net-Centric Approaches to Intelligence and National Security ent://SD_ILS/0/SD_ILS:504499 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Ladner, Roy. editor.<br/><a href="http://dx.doi.org/10.1007/b137009">http://dx.doi.org/10.1007/b137009</a><br/>Format:&#160;Electronic Resources<br/> Parallel and Distributed Computing: Applications and Technologies 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004. Proceedings ent://SD_ILS/0/SD_ILS:509720 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Liew, Kim-Meow. editor.<br/><a href="http://dx.doi.org/10.1007/b103538">http://dx.doi.org/10.1007/b103538</a><br/>Format:&#160;Electronic Resources<br/> Cryptography in C and C++ ent://SD_ILS/0/SD_ILS:507726 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Welschenbach, Michael. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-0026-0">http://dx.doi.org/10.1007/978-1-4302-0026-0</a><br/>Format:&#160;Electronic Resources<br/> Classification &mdash; the Ubiquitous Challenge Proceedings of the 28th Annual Conference of the Gesellschaft f&uuml;r Klassifikation e.V. University of Dortmund, March 9&ndash;11, 2004 ent://SD_ILS/0/SD_ILS:509361 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Weihs, Claus. editor.<br/><a href="http://dx.doi.org/10.1007/3-540-28084-7">http://dx.doi.org/10.1007/3-540-28084-7</a><br/>Format:&#160;Electronic Resources<br/> Advanced Techniques in Knowledge Discovery and Data Mining ent://SD_ILS/0/SD_ILS:508427 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Pal, Nikhil R. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-183-0">http://dx.doi.org/10.1007/1-84628-183-0</a><br/>Format:&#160;Electronic Resources<br/> Computer Security in the 21st Century ent://SD_ILS/0/SD_ILS:504252 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Lee, D. T. editor.<br/><a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format:&#160;Electronic Resources<br/> Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES) ent://SD_ILS/0/SD_ILS:504524 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing Platforms: Design and Applications ent://SD_ILS/0/SD_ILS:504243 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Smith, Sean W. author.<br/><a href="http://dx.doi.org/10.1007/b103637">http://dx.doi.org/10.1007/b103637</a><br/>Format:&#160;Electronic Resources<br/> Security in E-Learning ent://SD_ILS/0/SD_ILS:504480 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Weippl, Edgar. author.<br/><a href="http://dx.doi.org/10.1007/b136702">http://dx.doi.org/10.1007/b136702</a><br/>Format:&#160;Electronic Resources<br/> Multimedia Encryption and Watermarking ent://SD_ILS/0/SD_ILS:504482 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Furht, Borko. author.<br/><a href="http://dx.doi.org/10.1007/b136785">http://dx.doi.org/10.1007/b136785</a><br/>Format:&#160;Electronic Resources<br/> Automata, Languages and Programming 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510139 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Caires, Lu&iacute;s. editor.<br/><a href="http://dx.doi.org/10.1007/11523468">http://dx.doi.org/10.1007/11523468</a><br/>Format:&#160;Electronic Resources<br/> Certification and Security in Inter-Organizational E-Service ent://SD_ILS/0/SD_ILS:504345 2024-09-25T23:48:50Z 2024-09-25T23:48:50Z by&#160;Nardelli, Enrico. editor.<br/><a href="http://dx.doi.org/10.1007/11397427">http://dx.doi.org/10.1007/11397427</a><br/>Format:&#160;Electronic Resources<br/>