Search Results for - Narrowed by: Springer Collection - 2005 - Information Systems.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AONLINESPR$002509Springer$002bCollection$0026qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026qf$003dSUBJECT$002509Subject$002509Information$002bSystems.$002509Information$002bSystems.$0026ps$003d300?2024-06-21T15:36:00ZSoftware Product Line Engineering Foundations, Principles, and Techniquesent://SD_ILS/0/SD_ILS:5095172024-06-21T15:36:00Z2024-06-21T15:36:00Zby Pohl, Klaus. author.<br/><a href="http://dx.doi.org/10.1007/3-540-28901-1">http://dx.doi.org/10.1007/3-540-28901-1</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 – March 3, 2005. Revised Papersent://SD_ILS/0/SD_ILS:5101322024-06-21T15:36:00Z2024-06-21T15:36:00Zby Patrick, Andrew S. editor.<br/><a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format: Electronic Resources<br/>Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5097702024-06-21T15:36:00Z2024-06-21T15:36:00Zby Blundo, Carlo. editor.<br/><a href="http://dx.doi.org/10.1007/b105083">http://dx.doi.org/10.1007/b105083</a><br/>Format: Electronic Resources<br/>Formal Approaches to Software Testing 4th International Workshop, FATES 2004, Linz, Austria, September 21, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5102312024-06-21T15:36:00Z2024-06-21T15:36:00Zby Grabowski, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/b106767">http://dx.doi.org/10.1007/b106767</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105432024-06-21T15:36:00Z2024-06-21T15:36:00Zby Roy, Bimal. editor.<br/><a href="http://dx.doi.org/10.1007/11593447">http://dx.doi.org/10.1007/11593447</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - INDOCRYPT 2005 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105542024-06-21T15:36:00Z2024-06-21T15:36:00Zby Maitra, Subhamoy. editor.<br/><a href="http://dx.doi.org/10.1007/11596219">http://dx.doi.org/10.1007/11596219</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103662024-06-21T15:36:00Z2024-06-21T15:36:00Zby Winther, Rune. editor.<br/><a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format: Electronic Resources<br/>Security in Pervasive Computing Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103702024-06-21T15:36:00Z2024-06-21T15:36:00Zby Hutter, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/b135497">http://dx.doi.org/10.1007/b135497</a><br/>Format: Electronic Resources<br/>Model Driven Architecture European MDA Workshops: Foundations and Applications, MDAFA 2003 and MDAFA 2004, Twente, The Netherlands, June 26-27, 2003 and Linköping, Sweden, June 10-11, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5102032024-06-21T15:36:00Z2024-06-21T15:36:00Zby Aßmann, Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/11538097">http://dx.doi.org/10.1007/11538097</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5104432024-06-21T15:36:00Z2024-06-21T15:36:00Zby Park, Choon-sik. editor.<br/><a href="http://dx.doi.org/10.1007/b137120">http://dx.doi.org/10.1007/b137120</a><br/>Format: Electronic Resources<br/>Testing Commercial-off-the-Shelf Components and Systemsent://SD_ILS/0/SD_ILS:5091062024-06-21T15:36:00Z2024-06-21T15:36:00Zby Beydeda, Sami. editor.<br/><a href="http://dx.doi.org/10.1007/b138567">http://dx.doi.org/10.1007/b138567</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design III FOSAD 2004/2005 Tutorial Lecturesent://SD_ILS/0/SD_ILS:5103082024-06-21T15:36:00Z2024-06-21T15:36:00Zby Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/11554578">http://dx.doi.org/10.1007/11554578</a><br/>Format: Electronic Resources<br/>Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103092024-06-21T15:36:00Z2024-06-21T15:36:00Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11535706">http://dx.doi.org/10.1007/11535706</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2005 7th International Workshop, Edinburgh, UK, August 29 – September 1, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103122024-06-21T15:36:00Z2024-06-21T15:36:00Zby Rao, Josyula R. editor.<br/><a href="http://dx.doi.org/10.1007/11545262">http://dx.doi.org/10.1007/11545262</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2005 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104182024-06-21T15:36:00Z2024-06-21T15:36:00Zby Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/b136415">http://dx.doi.org/10.1007/b136415</a><br/>Format: Electronic Resources<br/>Audio- and Video-Based Biometric Person Authentication 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5100992024-06-21T15:36:00Z2024-06-21T15:36:00Zby Kanade, Takeo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-31638-1">http://dx.doi.org/10.1007/978-3-540-31638-1</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103492024-06-21T15:36:00Z2024-06-21T15:36:00Zby Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format: Electronic Resources<br/>Software Process Improvement 12th European Conference, EuroSPI 2005, Budapest, Hungary, November 9-11, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105472024-06-21T15:36:00Z2024-06-21T15:36:00Zby Richardson, Ita. editor.<br/><a href="http://dx.doi.org/10.1007/11586012">http://dx.doi.org/10.1007/11586012</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101032024-06-21T15:36:00Z2024-06-21T15:36:00Zby Julisch, Klaus. editor.<br/><a href="http://dx.doi.org/10.1007/b137798">http://dx.doi.org/10.1007/b137798</a><br/>Format: Electronic Resources<br/>Digital Watermarking Third International Workshop, IWDW 2004, Seoul, South Korea, October 30 - November 1, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5101892024-06-21T15:36:00Z2024-06-21T15:36:00Zby Cox, Ingemar J. editor.<br/><a href="http://dx.doi.org/10.1007/b106346">http://dx.doi.org/10.1007/b106346</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5106502024-06-21T15:36:00Z2024-06-21T15:36:00Zby Feng, Dengguo. editor.<br/><a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format: Electronic Resources<br/>Manage IT! Organizing IT Demand and IT Supplyent://SD_ILS/0/SD_ILS:5065842024-06-21T15:36:00Z2024-06-21T15:36:00Zby Thiadens, Theo. author.<br/><a href="http://dx.doi.org/10.1007/1-4020-3710-4">http://dx.doi.org/10.1007/1-4020-3710-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - INDOCRYPT 2004 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004. Proceedingsent://SD_ILS/0/SD_ILS:5097382024-06-21T15:36:00Z2024-06-21T15:36:00Zby Canteaut, Anne. editor.<br/><a href="http://dx.doi.org/10.1007/b104579">http://dx.doi.org/10.1007/b104579</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2005 The Cryptographers’ Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5097522024-06-21T15:36:00Z2024-06-21T15:36:00Zby Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/b105222">http://dx.doi.org/10.1007/b105222</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5097532024-06-21T15:36:00Z2024-06-21T15:36:00Zby Kilian, Joe. editor.<br/><a href="http://dx.doi.org/10.1007/b106171">http://dx.doi.org/10.1007/b106171</a><br/>Format: Electronic Resources<br/>Reliable Software Technology – Ada-Europe 2005 10th Ada-Europe International Conference on Reliable Software Technologies, York, UK, June 20-24, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101192024-06-21T15:36:00Z2024-06-21T15:36:00Zby Vardanega, Tullio. editor.<br/><a href="http://dx.doi.org/10.1007/b137344">http://dx.doi.org/10.1007/b137344</a><br/>Format: Electronic Resources<br/>Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papersent://SD_ILS/0/SD_ILS:5102192024-06-21T15:36:00Z2024-06-21T15:36:00Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5103312024-06-21T15:36:00Z2024-06-21T15:36:00Zby Martin, David. editor.<br/><a href="http://dx.doi.org/10.1007/b136164">http://dx.doi.org/10.1007/b136164</a><br/>Format: Electronic Resources<br/>ECOOP 2005 - Object-Oriented Programming 19th European Conference, Glasgow, UK, July 25-29, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101542024-06-21T15:36:00Z2024-06-21T15:36:00Zby Black, Andrew P. editor.<br/><a href="http://dx.doi.org/10.1007/11531142">http://dx.doi.org/10.1007/11531142</a><br/>Format: Electronic Resources<br/>Embedded Systems Design The ARTIST Roadmap for Research and Developmentent://SD_ILS/0/SD_ILS:5103432024-06-21T15:36:00Z2024-06-21T15:36:00Zby Bouyssounouse, Bruno. author.<br/><a href="http://dx.doi.org/10.1007/b106761">http://dx.doi.org/10.1007/b106761</a><br/>Format: Electronic Resources<br/>Secure Data Management Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103442024-06-21T15:36:00Z2024-06-21T15:36:00Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11552338">http://dx.doi.org/10.1007/11552338</a><br/>Format: Electronic Resources<br/>Trust, Privacy, and Security in Digital Business Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101862024-06-21T15:36:00Z2024-06-21T15:36:00Zby Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/11537878">http://dx.doi.org/10.1007/11537878</a><br/>Format: Electronic Resources<br/>UML Modeling Languages and Applications < <UML> > 2004 Satellite Activities, Lisbon, Portugal, October 11-15, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5101872024-06-21T15:36:00Z2024-06-21T15:36:00Zby Jardim Nunes, Nuno. editor.<br/><a href="http://dx.doi.org/10.1007/b106725">http://dx.doi.org/10.1007/b106725</a><br/>Format: Electronic Resources<br/>Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5106482024-06-21T15:36:00Z2024-06-21T15:36:00Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format: Electronic Resources<br/>Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5101992024-06-21T15:36:00Z2024-06-21T15:36:00Zby Lim, Chae Hoon. editor.<br/><a href="http://dx.doi.org/10.1007/b103174">http://dx.doi.org/10.1007/b103174</a><br/>Format: Electronic Resources<br/>Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103022024-06-21T15:36:00Z2024-06-21T15:36:00Zby Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105722024-06-21T15:36:00Z2024-06-21T15:36:00Zby Desmedt, Yvo G. editor.<br/><a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format: Electronic Resources<br/>SDL 2005: Model Driven 12th International SDL Forum, Grimstad, Norway, June 20-23, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5100172024-06-21T15:36:00Z2024-06-21T15:36:00Zby Prinz, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/b137793">http://dx.doi.org/10.1007/b137793</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101352024-06-21T15:36:00Z2024-06-21T15:36:00Zby Boyd, Colin. editor.<br/><a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format: Electronic Resources<br/>Model Driven Engineering Languages and Systems 8th International Conference, MoDELS 2005, Montego Bay, Jamaica, October 2-7, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104202024-06-21T15:36:00Z2024-06-21T15:36:00Zby Briand, Lionel. editor.<br/><a href="http://dx.doi.org/10.1007/11557432">http://dx.doi.org/10.1007/11557432</a><br/>Format: Electronic Resources<br/>Computational Intelligence and Security International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings Part Ient://SD_ILS/0/SD_ILS:5100762024-06-21T15:36:00Z2024-06-21T15:36:00Zby Hao, Yue. editor.<br/><a href="http://dx.doi.org/10.1007/11596448">http://dx.doi.org/10.1007/11596448</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2005 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5102532024-06-21T15:36:00Z2024-06-21T15:36:00Zby Shoup, Victor. editor.<br/><a href="http://dx.doi.org/10.1007/11535218">http://dx.doi.org/10.1007/11535218</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103512024-06-21T15:36:00Z2024-06-21T15:36:00Zby Vimercati, Sabrina de Capitani. editor.<br/><a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format: Electronic Resources<br/>Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103642024-06-21T15:36:00Z2024-06-21T15:36:00Zby Gorodetsky, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format: Electronic Resources<br/>Scenarios: Models, Transformations and Tools International Workshop, Dagstuhl Castle, Germany, September 7-12, 2003, Revised Selected Papersent://SD_ILS/0/SD_ILS:5103952024-06-21T15:36:00Z2024-06-21T15:36:00Zby Leue, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/b137052">http://dx.doi.org/10.1007/b137052</a><br/>Format: Electronic Resources<br/>Rapid Integration of Software Engineering Techniques First International Workshop, RISE 2004, Luxembourg-Kirchberg, Luxembourg, November 26, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5104022024-06-21T15:36:00Z2024-06-21T15:36:00Zby Guelfi, Nicolas. editor.<br/><a href="http://dx.doi.org/10.1007/b136153">http://dx.doi.org/10.1007/b136153</a><br/>Format: Electronic Resources<br/>E-government and Public Sector Process Rebuilding Dilettantes, Wheel Barrows, and Diamondsent://SD_ILS/0/SD_ILS:5076882024-06-21T15:36:00Z2024-06-21T15:36:00Zby Andersen, Kim Viborg. author.<br/><a href="http://dx.doi.org/10.1007/b116842">http://dx.doi.org/10.1007/b116842</a><br/>Format: Electronic Resources<br/>Computer Insecurity Risking the Systement://SD_ILS/0/SD_ILS:5084882024-06-21T15:36:00Z2024-06-21T15:36:00Zby Furnell, Steven. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-270-5">http://dx.doi.org/10.1007/1-84628-270-5</a><br/>Format: Electronic Resources<br/>Best Practices in Software Measurement How to use metrics to improve project and process performanceent://SD_ILS/0/SD_ILS:5089722024-06-21T15:36:00Z2024-06-21T15:36:00Zby Ebert, Christof. author.<br/><a href="http://dx.doi.org/10.1007/b138013">http://dx.doi.org/10.1007/b138013</a><br/>Format: Electronic Resources<br/>Engineering and Managing Software Requirementsent://SD_ILS/0/SD_ILS:5093952024-06-21T15:36:00Z2024-06-21T15:36:00Zby Aurum, Aybüke. editor.<br/><a href="http://dx.doi.org/10.1007/3-540-28244-0">http://dx.doi.org/10.1007/3-540-28244-0</a><br/>Format: Electronic Resources<br/>Ambient Networks 16th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2005, Barcelona, Spain, October 24-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105202024-06-21T15:36:00Z2024-06-21T15:36:00Zby Schönwälder, Jürgen. editor.<br/><a href="http://dx.doi.org/10.1007/11568285">http://dx.doi.org/10.1007/11568285</a><br/>Format: Electronic Resources<br/>Software Product Lines 9th International Conference, SPLC 2005, Rennes, France, September 26-29, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104252024-06-21T15:36:00Z2024-06-21T15:36:00Zby Obbink, Henk. editor.<br/><a href="http://dx.doi.org/10.1007/11554844">http://dx.doi.org/10.1007/11554844</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – Mycrypt 2005 First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104272024-06-21T15:36:00Z2024-06-21T15:36:00Zby Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/11554868">http://dx.doi.org/10.1007/11554868</a><br/>Format: Electronic Resources<br/>Outsourcing to India The Offshore Advantageent://SD_ILS/0/SD_ILS:5088262024-06-21T15:36:00Z2024-06-21T15:36:00Zby Kobayashi-Hillary, Mark. author.<br/><a href="http://dx.doi.org/10.1007/b106280">http://dx.doi.org/10.1007/b106280</a><br/>Format: Electronic Resources<br/>Extreme Programming and Agile Processes in Software Engineering 6th International Conference, XP 2005, Sheffield, UK, June 18-23, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5099692024-06-21T15:36:00Z2024-06-21T15:36:00Zby Baumeister, Hubert. editor.<br/><a href="http://dx.doi.org/10.1007/b137278">http://dx.doi.org/10.1007/b137278</a><br/>Format: Electronic Resources<br/>Advanced Studies in Biometrics Summer School on Biometrics, Alghero, Italy, June 2-6, 2003. Revised Selected Lectures and Papersent://SD_ILS/0/SD_ILS:5094722024-06-21T15:36:00Z2024-06-21T15:36:00Zby Tistarelli, Massimo. editor.<br/><a href="http://dx.doi.org/10.1007/b136906">http://dx.doi.org/10.1007/b136906</a><br/>Format: Electronic Resources<br/>Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5097572024-06-21T15:36:00Z2024-06-21T15:36:00Zby Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format: Electronic Resources<br/>Self-Stabilizing Systems 7th International Symposium, SSS 2005, Barcelona, Spain, October 26-27, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104792024-06-21T15:36:00Z2024-06-21T15:36:00Zby Tixeuil, Sébastien. editor.<br/><a href="http://dx.doi.org/10.1007/11577327">http://dx.doi.org/10.1007/11577327</a><br/>Format: Electronic Resources<br/>FM 2005: Formal Methods International Symposium of Formal Methods Europe, Newcastle, UK, July 18-22, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101472024-06-21T15:36:00Z2024-06-21T15:36:00Zby Fitzgerald, John. editor.<br/><a href="http://dx.doi.org/10.1007/b27882">http://dx.doi.org/10.1007/b27882</a><br/>Format: Electronic Resources<br/>Digital Watermarking 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104152024-06-21T15:36:00Z2024-06-21T15:36:00Zby Barni, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/11551492">http://dx.doi.org/10.1007/11551492</a><br/>Format: Electronic Resources<br/>Model Driven Architecture – Foundations and Applications First European Conference, ECMDA-FA 2005, Nuremberg, Germany, November 7-10, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104532024-06-21T15:36:00Z2024-06-21T15:36:00Zby Hartman, Alan. editor.<br/><a href="http://dx.doi.org/10.1007/11581741">http://dx.doi.org/10.1007/11581741</a><br/>Format: Electronic Resources<br/>Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104592024-06-21T15:36:00Z2024-06-21T15:36:00Zby Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format: Electronic Resources<br/>Perspectives and Policies on ICT in Society An IFIP TC9 (Computers and Society) Handbookent://SD_ILS/0/SD_ILS:5044162024-06-21T15:36:00Z2024-06-21T15:36:00Zby Berleur, Jacques. editor.<br/><a href="http://dx.doi.org/10.1007/b135654">http://dx.doi.org/10.1007/b135654</a><br/>Format: Electronic Resources<br/>Logical Data Modeling What it is and How to do itent://SD_ILS/0/SD_ILS:5040812024-06-21T15:36:00Z2024-06-21T15:36:00Zby Chmura, Alan. author.<br/><a href="http://dx.doi.org/10.1007/b100064">http://dx.doi.org/10.1007/b100064</a><br/>Format: Electronic Resources<br/>Analyzing Computer System Performance with Perl::PDQent://SD_ILS/0/SD_ILS:5090142024-06-21T15:36:00Z2024-06-21T15:36:00Zby Gunther, Neil J. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-26860-4">http://dx.doi.org/10.1007/978-3-540-26860-4</a><br/>Format: Electronic Resources<br/>Secure Systems Development with UMLent://SD_ILS/0/SD_ILS:5088952024-06-21T15:36:00Z2024-06-21T15:36:00Zby Jürjens, Jan. author.<br/><a href="http://dx.doi.org/10.1007/b137706">http://dx.doi.org/10.1007/b137706</a><br/>Format: Electronic Resources<br/>Computer Network Securityent://SD_ILS/0/SD_ILS:5043732024-06-21T15:36:00Z2024-06-21T15:36:00Zby Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format: Electronic Resources<br/>