Search Results for - Narrowed by: Springer Collection - Management of Computing and Information Systems.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AONLINESPR$002509Springer$002bCollection$0026qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026ps$003d300$0026isd$003dtrue?2024-06-17T14:15:32ZNordic Contributions in IS Research 9th Scandinavian Conference on Information Systems, SCIS 2018, Odder, Denmark, August 5–8, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20849292024-06-17T14:15:32Z2024-06-17T14:15:32Zby Müller, Sune Dueholm. editor. (orcid)0000-0003-3194-0233<br/><a href="https://doi.org/10.1007/978-3-319-96367-9">https://doi.org/10.1007/978-3-319-96367-9</a><br/>Format: Electronic Resources<br/>Software Development Measurement Programs Development, Management and Evolutionent://SD_ILS/0/SD_ILS:20849912024-06-17T14:15:32Z2024-06-17T14:15:32Zby Staron, Miroslaw. author.<br/><a href="https://doi.org/10.1007/978-3-319-91836-5">https://doi.org/10.1007/978-3-319-91836-5</a><br/>Format: Electronic Resources<br/>Automated Invention for Smart Industries 18th International TRIZ Future Conference, TFC 2018, Strasbourg, France, October 29–31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20841812024-06-17T14:15:32Z2024-06-17T14:15:32Zby Cavallucci, Denis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02456-7">https://doi.org/10.1007/978-3-030-02456-7</a><br/>Format: Electronic Resources<br/>Software Business 9th International Conference, ICSOB 2018, Tallinn, Estonia, June 11–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20843512024-06-17T14:15:32Z2024-06-17T14:15:32Zby Wnuk, Krzysztof. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04840-2">https://doi.org/10.1007/978-3-030-04840-2</a><br/>Format: Electronic Resources<br/>Handbook of Mobile Data Privacyent://SD_ILS/0/SD_ILS:20843032024-06-17T14:15:32Z2024-06-17T14:15:32Zby Gkoulalas-Divanis, Aris. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852902024-06-17T14:15:32Z2024-06-17T14:15:32Zby Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format: Electronic Resources<br/>Crowdsourcing of Sensor Cloud Servicesent://SD_ILS/0/SD_ILS:20847192024-06-17T14:15:32Z2024-06-17T14:15:32Zby Ghari Neiat, Azadeh. author.<br/><a href="https://doi.org/10.1007/978-3-319-91536-4">https://doi.org/10.1007/978-3-319-91536-4</a><br/>Format: Electronic Resources<br/>Economic Models for Managing Cloud Servicesent://SD_ILS/0/SD_ILS:20848992024-06-17T14:15:32Z2024-06-17T14:15:32Zby Mistry, Sajib. author.<br/><a href="https://doi.org/10.1007/978-3-319-73876-5">https://doi.org/10.1007/978-3-319-73876-5</a><br/>Format: Electronic Resources<br/>Align Client and Provider Perspectives Best Practices in IT Outsourcingent://SD_ILS/0/SD_ILS:20841892024-06-17T14:15:32Z2024-06-17T14:15:32Zby Haas, Lionel. author.<br/><a href="https://doi.org/10.1007/978-3-319-92064-1">https://doi.org/10.1007/978-3-319-92064-1</a><br/>Format: Electronic Resources<br/>Applications and Usability of Interactive Television 6th Iberoamerican Conference, jAUTI 2017, Aveiro, Portugal, October 12-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844622024-06-17T14:15:32Z2024-06-17T14:15:32Zby Abásolo, María José. editor.<br/><a href="https://doi.org/10.1007/978-3-319-90170-1">https://doi.org/10.1007/978-3-319-90170-1</a><br/>Format: Electronic Resources<br/>Data Privacy Gamesent://SD_ILS/0/SD_ILS:20845012024-06-17T14:15:32Z2024-06-17T14:15:32Zby Xu, Lei. author.<br/><a href="https://doi.org/10.1007/978-3-319-77965-2">https://doi.org/10.1007/978-3-319-77965-2</a><br/>Format: Electronic Resources<br/>A Knowledge Representation Practionary Guidelines Based on Charles Sanders Peirceent://SD_ILS/0/SD_ILS:20843832024-06-17T14:15:32Z2024-06-17T14:15:32Zby Bergman, Michael K. author.<br/><a href="https://doi.org/10.1007/978-3-319-98092-8">https://doi.org/10.1007/978-3-319-98092-8</a><br/>Format: Electronic Resources<br/>IT Management The art of managing IT based on a solid framework leveraging the company´s political ecosystement://SD_ILS/0/SD_ILS:20846622024-06-17T14:15:32Z2024-06-17T14:15:32Zby Pilorget, Lionel. author.<br/><a href="https://doi.org/10.1007/978-3-658-19309-6">https://doi.org/10.1007/978-3-658-19309-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20855382024-06-17T14:15:32Z2024-06-17T14:15:32Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Bidirectional Transformations International Summer School, Oxford, UK, July 25-29, 2016, Tutorial Lecturesent://SD_ILS/0/SD_ILS:20856412024-06-17T14:15:32Z2024-06-17T14:15:32Zby Gibbons, Jeremy. editor. (orcid)0000-0002-8426-9917<br/><a href="https://doi.org/10.1007/978-3-319-79108-1">https://doi.org/10.1007/978-3-319-79108-1</a><br/>Format: Electronic Resources<br/>The Agile Safety Caseent://SD_ILS/0/SD_ILS:20849612024-06-17T14:15:32Z2024-06-17T14:15:32Zby Myklebust, Thor. author.<br/><a href="https://doi.org/10.1007/978-3-319-70265-0">https://doi.org/10.1007/978-3-319-70265-0</a><br/>Format: Electronic Resources<br/>Health Informatics on FHIR: How HL7's New API is Transforming Healthcareent://SD_ILS/0/SD_ILS:20842472024-06-17T14:15:32Z2024-06-17T14:15:32Zby Braunstein, Mark L. author.<br/><a href="https://doi.org/10.1007/978-3-319-93414-3">https://doi.org/10.1007/978-3-319-93414-3</a><br/>Format: Electronic Resources<br/>Collaborative Networks of Cognitive Systems 19th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2018, Cardiff, UK, September 17-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842582024-06-17T14:15:32Z2024-06-17T14:15:32Zby Camarinha-Matos, Luis M. editor. (orcid)0000-0003-0594-1961<br/><a href="https://doi.org/10.1007/978-3-319-99127-6">https://doi.org/10.1007/978-3-319-99127-6</a><br/>Format: Electronic Resources<br/>Systems, Software and Services Process Improvement 25th European Conference, EuroSPI 2018, Bilbao, Spain, September 5-7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842112024-06-17T14:15:32Z2024-06-17T14:15:32Zby Larrucea, Xabier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97925-0">https://doi.org/10.1007/978-3-319-97925-0</a><br/>Format: Electronic Resources<br/>Software Processes and Life Cycle Models An Introduction to Modelling, Using and Managing Agile, Plan-Driven and Hybrid Processesent://SD_ILS/0/SD_ILS:20842212024-06-17T14:15:32Z2024-06-17T14:15:32Zby Kneuper, Ralf. author.<br/><a href="https://doi.org/10.1007/978-3-319-98845-0">https://doi.org/10.1007/978-3-319-98845-0</a><br/>Format: Electronic Resources<br/>Agile Processes in Software Engineering and Extreme Programming 19th International Conference, XP 2018, Porto, Portugal, May 21–25, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20844832024-06-17T14:15:32Z2024-06-17T14:15:32Zby Garbajosa, Juan. editor. (orcid)0000-0003-0161-3485<br/><a href="https://doi.org/10.1007/978-3-319-91602-6">https://doi.org/10.1007/978-3-319-91602-6</a><br/>Format: Electronic Resources<br/>Cybersecurity in China The Next Waveent://SD_ILS/0/SD_ILS:20841182024-06-17T14:15:32Z2024-06-17T14:15:32Zby Austin, Greg. author.<br/><a href="https://doi.org/10.1007/978-3-319-68436-9">https://doi.org/10.1007/978-3-319-68436-9</a><br/>Format: Electronic Resources<br/>The Essence of Software Engineeringent://SD_ILS/0/SD_ILS:20846632024-06-17T14:15:32Z2024-06-17T14:15:32Zby Gruhn, Volker. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73897-0">https://doi.org/10.1007/978-3-319-73897-0</a><br/>Format: Electronic Resources<br/>Advanced Computing Strategies for Engineering 25th EG-ICE International Workshop 2018, Lausanne, Switzerland, June 10-13, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20851172024-06-17T14:15:32Z2024-06-17T14:15:32Zby Smith, Ian F. C. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91638-5">https://doi.org/10.1007/978-3-319-91638-5</a><br/>Format: Electronic Resources<br/>Sailing Routes in the World of Computation 14th Conference on Computability in Europe, CiE 2018, Kiel, Germany, July 30 – August 3, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851242024-06-17T14:15:32Z2024-06-17T14:15:32Zby Manea, Florin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94418-0">https://doi.org/10.1007/978-3-319-94418-0</a><br/>Format: Electronic Resources<br/>Graphics Recognition. Current Trends and Evolutions 12th IAPR International Workshop, GREC 2017, Kyoto, Japan, November 9-10, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20853012024-06-17T14:15:32Z2024-06-17T14:15:32Zby Fornés, Alicia. editor. (orcid)0000-0002-9692-5336<br/><a href="https://doi.org/10.1007/978-3-030-02284-6">https://doi.org/10.1007/978-3-030-02284-6</a><br/>Format: Electronic Resources<br/>Advanced Computing Strategies for Engineering 25th EG-ICE International Workshop 2018, Lausanne, Switzerland, June 10-13, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860372024-06-17T14:15:32Z2024-06-17T14:15:32Zby Smith, Ian F. C. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91635-4">https://doi.org/10.1007/978-3-319-91635-4</a><br/>Format: Electronic Resources<br/>Information Technology - New Generations 14th International Conference on Information Technologyent://SD_ILS/0/SD_ILS:20875522024-06-17T14:15:32Z2024-06-17T14:15:32Zby Latifi, Shahram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54978-1">https://doi.org/10.1007/978-3-319-54978-1</a><br/>Format: Electronic Resources<br/>Fog Computing Concepts, Frameworks and Technologiesent://SD_ILS/0/SD_ILS:20849832024-06-17T14:15:32Z2024-06-17T14:15:32Zby Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94890-4">https://doi.org/10.1007/978-3-319-94890-4</a><br/>Format: Electronic Resources<br/>Software Process Improvement and Capability Determination 18th International Conference, SPICE 2018, Thessaloniki, Greece, October 9–10, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20843292024-06-17T14:15:32Z2024-06-17T14:15:32Zby Stamelos, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00623-5">https://doi.org/10.1007/978-3-030-00623-5</a><br/>Format: Electronic Resources<br/>Enterprise Modeling Facilitating the Process and the Peopleent://SD_ILS/0/SD_ILS:20843422024-06-17T14:15:32Z2024-06-17T14:15:32Zby Stirna, Janis. author. (orcid)0000-0002-3669-832X<br/><a href="https://doi.org/10.1007/978-3-319-94857-7">https://doi.org/10.1007/978-3-319-94857-7</a><br/>Format: Electronic Resources<br/>Smart Cities Development and Governance Frameworksent://SD_ILS/0/SD_ILS:20844502024-06-17T14:15:32Z2024-06-17T14:15:32Zby Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76669-0">https://doi.org/10.1007/978-3-319-76669-0</a><br/>Format: Electronic Resources<br/>Semantic Applications Methodology, Technology, Corporate Useent://SD_ILS/0/SD_ILS:20844512024-06-17T14:15:32Z2024-06-17T14:15:32Zby Hoppe, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-55433-3">https://doi.org/10.1007/978-3-662-55433-3</a><br/>Format: Electronic Resources<br/>Agile Methods 8th Brazilian Workshop, WBMA 2017, Belém, Brazil, September 13–14, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20841852024-06-17T14:15:32Z2024-06-17T14:15:32Zby Santos, Viviane Almeida dos. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73673-0">https://doi.org/10.1007/978-3-319-73673-0</a><br/>Format: Electronic Resources<br/>Product Lifecycle Management to Support Industry 4.0 15th IFIP WG 5.1 International Conference, PLM 2018, Turin, Italy, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20843532024-06-17T14:15:32Z2024-06-17T14:15:32Zby Chiabert, Paolo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01614-2">https://doi.org/10.1007/978-3-030-01614-2</a><br/>Format: Electronic Resources<br/>Software Quality: Methods and Tools for Better Software and Systems 10th International Conference, SWQD 2018, Vienna, Austria, January 16–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20845722024-06-17T14:15:32Z2024-06-17T14:15:32Zby Winkler, Dietmar. editor. (orcid)0000-0002-4743-3124<br/><a href="https://doi.org/10.1007/978-3-319-71440-0">https://doi.org/10.1007/978-3-319-71440-0</a><br/>Format: Electronic Resources<br/>SafeScrum® – Agile Development of Safety-Critical Softwareent://SD_ILS/0/SD_ILS:20842732024-06-17T14:15:32Z2024-06-17T14:15:32Zby Hanssen, Geir Kjetil. author.<br/><a href="https://doi.org/10.1007/978-3-319-99334-8">https://doi.org/10.1007/978-3-319-99334-8</a><br/>Format: Electronic Resources<br/>Transforming the IT Services Lifecycle with AI Technologiesent://SD_ILS/0/SD_ILS:20843102024-06-17T14:15:32Z2024-06-17T14:15:32Zby Kloeckner, Kristof. author.<br/><a href="https://doi.org/10.1007/978-3-319-94048-9">https://doi.org/10.1007/978-3-319-94048-9</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20847972024-06-17T14:15:32Z2024-06-17T14:15:32Zby Matoušek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Information Literacy in the Workplace 5th European Conference, ECIL 2017, Saint Malo, France, September 18-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847982024-06-17T14:15:32Z2024-06-17T14:15:32Zby Kurbanoğlu, Serap. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74334-9">https://doi.org/10.1007/978-3-319-74334-9</a><br/>Format: Electronic Resources<br/>Towards Extensible and Adaptable Methods in Computingent://SD_ILS/0/SD_ILS:20844102024-06-17T14:15:32Z2024-06-17T14:15:32Zby Chakraverty, Shampa. editor.<br/><a href="https://doi.org/10.1007/978-981-13-2348-5">https://doi.org/10.1007/978-981-13-2348-5</a><br/>Format: Electronic Resources<br/>Combinatorial Image Analysis 19th International Workshop, IWCIA 2018, Porto, Portugal, November 22–24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852812024-06-17T14:15:32Z2024-06-17T14:15:32Zby Barneva, Reneta P. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05288-1">https://doi.org/10.1007/978-3-030-05288-1</a><br/>Format: Electronic Resources<br/>Thinking-Driven Testing The Most Reasonable Approach to Quality Controlent://SD_ILS/0/SD_ILS:20846962024-06-17T14:15:32Z2024-06-17T14:15:32Zby Roman, Adam. author.<br/><a href="https://doi.org/10.1007/978-3-319-73195-7">https://doi.org/10.1007/978-3-319-73195-7</a><br/>Format: Electronic Resources<br/>Project Management at the Edge of Chaos Social Techniques for Complex Systemsent://SD_ILS/0/SD_ILS:20846982024-06-17T14:15:32Z2024-06-17T14:15:32Zby Oswald, Alfred. author.<br/><a href="https://doi.org/10.1007/978-3-662-48261-2">https://doi.org/10.1007/978-3-662-48261-2</a><br/>Format: Electronic Resources<br/>The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?ent://SD_ILS/0/SD_ILS:20849012024-06-17T14:15:32Z2024-06-17T14:15:32Zby Lysne, Olav. author.<br/><a href="https://doi.org/10.1007/978-3-319-74950-1">https://doi.org/10.1007/978-3-319-74950-1</a><br/>Format: Electronic Resources<br/>Cyber Security: Power and Technologyent://SD_ILS/0/SD_ILS:20869802024-06-17T14:15:32Z2024-06-17T14:15:32Zby Lehto, Martti. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2018 The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855792024-06-17T14:15:32Z2024-06-17T14:15:32Zby Smart, Nigel P. editor. (orcid)0000-0003-3567-3304<br/><a href="https://doi.org/10.1007/978-3-319-76953-0">https://doi.org/10.1007/978-3-319-76953-0</a><br/>Format: Electronic Resources<br/>System Analysis and Modeling. Languages, Methods, and Tools for Systems Engineering 10th International Conference, SAM 2018, Copenhagen, Denmark, October 15–16, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854082024-06-17T14:15:32Z2024-06-17T14:15:32Zby Khendek, Ferhat. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01042-3">https://doi.org/10.1007/978-3-030-01042-3</a><br/>Format: Electronic Resources<br/>Proceedings of the Eleventh International Conference on Management Science and Engineering Managementent://SD_ILS/0/SD_ILS:20882812024-06-17T14:15:32Z2024-06-17T14:15:32Zby Xu, Jiuping. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59280-0">https://doi.org/10.1007/978-3-319-59280-0</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855232024-06-17T14:15:32Z2024-06-17T14:15:32Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Computer and Information Scienceent://SD_ILS/0/SD_ILS:20882152024-06-17T14:15:32Z2024-06-17T14:15:32Zby Lee, Roger. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60170-0">https://doi.org/10.1007/978-3-319-60170-0</a><br/>Format: Electronic Resources<br/>Managing Software Process Evolution Traditional, Agile and Beyond – How to Handle Process Changeent://SD_ILS/0/SD_ILS:20850102024-06-17T14:15:32Z2024-06-17T14:15:32Zby Kuhrmann, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31545-4">https://doi.org/10.1007/978-3-319-31545-4</a><br/>Format: Electronic Resources<br/>Advanced Multimedia and Ubiquitous Engineering FutureTech & MUEent://SD_ILS/0/SD_ILS:20840362024-06-17T14:15:32Z2024-06-17T14:15:32Zby Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-981-10-1536-6">https://doi.org/10.1007/978-981-10-1536-6</a><br/>Format: Electronic Resources<br/>Software Quality. The Future of Systems- and Software Development 8th International Conference, SWQD 2016, Vienna, Austria, January 18-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20844382024-06-17T14:15:32Z2024-06-17T14:15:32Zby Winkler, Dietmar. editor.<br/><a href="https://doi.org/10.1007/978-3-319-27033-3">https://doi.org/10.1007/978-3-319-27033-3</a><br/>Format: Electronic Resources<br/>Open Source Systems: Integrating Communities 12th IFIP WG 2.13 International Conference, OSS 2016, Gothenburg, Sweden, May 30 - June 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20849992024-06-17T14:15:32Z2024-06-17T14:15:32Zby Crowston, Kevin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39225-7">https://doi.org/10.1007/978-3-319-39225-7</a><br/>Format: Electronic Resources<br/>Product Lifecycle Management in the Era of Internet of Things 12th IFIP WG 5.1 International Conference, PLM 2015, Doha, Qatar, October 19-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20841742024-06-17T14:15:32Z2024-06-17T14:15:32Zby Bouras, Abdelaziz. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33111-9">https://doi.org/10.1007/978-3-319-33111-9</a><br/>Format: Electronic Resources<br/>Cloud Computing and Services Science 5th International Conference, CLOSER 2015, Lisbon, Portugal, May 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20845542024-06-17T14:15:32Z2024-06-17T14:15:32Zby Helfert, Markus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29582-4">https://doi.org/10.1007/978-3-319-29582-4</a><br/>Format: Electronic Resources<br/>Managing Information Technologyent://SD_ILS/0/SD_ILS:20840892024-06-17T14:15:32Z2024-06-17T14:15:32Zby Castillo, Francisco. author.<br/><a href="https://doi.org/10.1007/978-3-319-38891-5">https://doi.org/10.1007/978-3-319-38891-5</a><br/>Format: Electronic Resources<br/>Modeling with UML Language, Concepts, Methodsent://SD_ILS/0/SD_ILS:20847412024-06-17T14:15:32Z2024-06-17T14:15:32Zby Rumpe, Bernhard. author.<br/><a href="https://doi.org/10.1007/978-3-319-33933-7">https://doi.org/10.1007/978-3-319-33933-7</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841052024-06-17T14:15:32Z2024-06-17T14:15:32Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format: Electronic Resources<br/>Pragmatic Evaluation of Software Architecturesent://SD_ILS/0/SD_ILS:20847612024-06-17T14:15:32Z2024-06-17T14:15:32Zby Knodel, Jens. author.<br/><a href="https://doi.org/10.1007/978-3-319-34177-4">https://doi.org/10.1007/978-3-319-34177-4</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848392024-06-17T14:15:32Z2024-06-17T14:15:32Zby Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format: Electronic Resources<br/>Collaboration in a Hyperconnected World 17th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2016, Porto, Portugal, October 3-5, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848422024-06-17T14:15:32Z2024-06-17T14:15:32Zby Afsarmanesh, Hamideh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45390-3">https://doi.org/10.1007/978-3-319-45390-3</a><br/>Format: Electronic Resources<br/>Beyond Interpretivism? New Encounters with Technology and Organization IFIP WG 8.2 Working Conference on Information Systems and Organizations, IS&O 2016, Dublin, Ireland, December 9-10, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848432024-06-17T14:15:32Z2024-06-17T14:15:32Zby Introna, Lucas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49733-4">https://doi.org/10.1007/978-3-319-49733-4</a><br/>Format: Electronic Resources<br/>Guide to Software Development Designing and Managing the Life Cycleent://SD_ILS/0/SD_ILS:20847702024-06-17T14:15:32Z2024-06-17T14:15:32Zby Langer, Arthur M. author.<br/><a href="https://doi.org/10.1007/978-1-4471-6799-0">https://doi.org/10.1007/978-1-4471-6799-0</a><br/>Format: Electronic Resources<br/>Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847772024-06-17T14:15:32Z2024-06-17T14:15:32Zby Haltinner, Kristin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28313-5">https://doi.org/10.1007/978-3-319-28313-5</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852382024-06-17T14:15:32Z2024-06-17T14:15:32Zby Franz, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45572-3">https://doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Advances in Network Science 12th International Conference and School, NetSci-X 2016, Wroclaw, Poland, January 11-13, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20855492024-06-17T14:15:32Z2024-06-17T14:15:32Zby Wierzbicki, Adam. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28361-6">https://doi.org/10.1007/978-3-319-28361-6</a><br/>Format: Electronic Resources<br/>Product-Focused Software Process Improvement 17th International Conference, PROFES 2016, Trondheim, Norway, November 22-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852622024-06-17T14:15:32Z2024-06-17T14:15:32Zby Abrahamsson, Pekka. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49094-6">https://doi.org/10.1007/978-3-319-49094-6</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854432024-06-17T14:15:32Z2024-06-17T14:15:32Zby Bica, Ion. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47238-6">https://doi.org/10.1007/978-3-319-47238-6</a><br/>Format: Electronic Resources<br/>Multiple Access Communications 9th International Workshop, MACOM 2016, Aalborg, Denmark, November 21-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850952024-06-17T14:15:32Z2024-06-17T14:15:32Zby Madsen, Tatiana K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51376-8">https://doi.org/10.1007/978-3-319-51376-8</a><br/>Format: Electronic Resources<br/>Social Media: The Good, the Bad, and the Ugly 15th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2016, Swansea, UK, September 13–15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20851962024-06-17T14:15:32Z2024-06-17T14:15:32Zby Dwivedi, Yogesh K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45234-0">https://doi.org/10.1007/978-3-319-45234-0</a><br/>Format: Electronic Resources<br/>Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papersent://SD_ILS/0/SD_ILS:20860622024-06-17T14:15:32Z2024-06-17T14:15:32Zby Bécue, Adrien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40385-4">https://doi.org/10.1007/978-3-319-40385-4</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20860632024-06-17T14:15:32Z2024-06-17T14:15:32Zby Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing 14th International Conference, ICSOC 2016, Banff, AB, Canada, October 10-13, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860032024-06-17T14:15:32Z2024-06-17T14:15:32Zby Sheng, Quan Z. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46295-0">https://doi.org/10.1007/978-3-319-46295-0</a><br/>Format: Electronic Resources<br/>Model and Data Engineering 6th International Conference, MEDI 2016, Almería, Spain, September 21-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856142024-06-17T14:15:32Z2024-06-17T14:15:32Zby Bellatreche, Ladjel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45547-1">https://doi.org/10.1007/978-3-319-45547-1</a><br/>Format: Electronic Resources<br/>Provable Security 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854302024-06-17T14:15:32Z2024-06-17T14:15:32Zby Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47422-9">https://doi.org/10.1007/978-3-319-47422-9</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852562024-06-17T14:15:32Z2024-06-17T14:15:32Zby Gierlichs, Benedikt. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53140-2">https://doi.org/10.1007/978-3-662-53140-2</a><br/>Format: Electronic Resources<br/>Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850862024-06-17T14:15:32Z2024-06-17T14:15:32Zby Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format: Electronic Resources<br/>System Analysis and Modeling. Technology-Specific Aspects of Models 9th International Conference, SAM 2016, Saint-Melo, France, October 3-4, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20850872024-06-17T14:15:32Z2024-06-17T14:15:32Zby Grabowski, Jens. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46613-2">https://doi.org/10.1007/978-3-319-46613-2</a><br/>Format: Electronic Resources<br/>Systems, Software and Services Process Improvement 23rd European Conference, EuroSPI 2016, Graz, Austria, September 14-16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848852024-06-17T14:15:32Z2024-06-17T14:15:32Zby Kreiner, Christian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44817-6">https://doi.org/10.1007/978-3-319-44817-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:20857362024-06-17T14:15:32Z2024-06-17T14:15:32Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53015-3">https://doi.org/10.1007/978-3-662-53015-3</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2–8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857442024-06-17T14:15:32Z2024-06-17T14:15:32Zby Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20857452024-06-17T14:15:32Z2024-06-17T14:15:32Zby Karagiannis, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30505-9">https://doi.org/10.1007/978-3-319-30505-9</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lecturesent://SD_ILS/0/SD_ILS:20858582024-06-17T14:15:32Z2024-06-17T14:15:32Zby Aldini, Alessandro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format: Electronic Resources<br/>Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856982024-06-17T14:15:32Z2024-06-17T14:15:32Zby Lam, Kwok-Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50011-9">https://doi.org/10.1007/978-3-319-50011-9</a><br/>Format: Electronic Resources<br/>Business Process Management 14th International Conference, BPM 2016, Rio de Janeiro, Brazil, September 18-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20857682024-06-17T14:15:32Z2024-06-17T14:15:32Zby La Rosa, Marcello. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45348-4">https://doi.org/10.1007/978-3-319-45348-4</a><br/>Format: Electronic Resources<br/>Co-production in the Public Sector Experiences and Challengesent://SD_ILS/0/SD_ILS:20846942024-06-17T14:15:32Z2024-06-17T14:15:32Zby Fugini, Mariagrazia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30558-5">https://doi.org/10.1007/978-3-319-30558-5</a><br/>Format: Electronic Resources<br/>Formal Aspects of Component Software 12th International Conference, FACS 2015, Niterói, Brazil, October 14-16, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857862024-06-17T14:15:32Z2024-06-17T14:15:32Zby Braga, Christiano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28934-2">https://doi.org/10.1007/978-3-319-28934-2</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847162024-06-17T14:15:32Z2024-06-17T14:15:32Zby Aspinall, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41763-9">https://doi.org/10.1007/978-3-319-41763-9</a><br/>Format: Electronic Resources<br/>Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859862024-06-17T14:15:32Z2024-06-17T14:15:32Zby Badonnel, Rémi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39814-3">https://doi.org/10.1007/978-3-319-39814-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860592024-06-17T14:15:32Z2024-06-17T14:15:32Zby Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53887-6">https://doi.org/10.1007/978-3-662-53887-6</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861532024-06-17T14:15:32Z2024-06-17T14:15:32Zby Tryfonas, Theo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39381-0">https://doi.org/10.1007/978-3-319-39381-0</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860662024-06-17T14:15:32Z2024-06-17T14:15:32Zby Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48057-2">https://doi.org/10.1007/978-3-319-48057-2</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860062024-06-17T14:15:32Z2024-06-17T14:15:32Zby Bonakdarpour, Borzoo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49259-9">https://doi.org/10.1007/978-3-319-49259-9</a><br/>Format: Electronic Resources<br/>Web Services, Formal Methods, and Behavioral Types 11th International Workshop, WS-FM 2014, Eindhoven, The Netherlands, September 11-12, 2014, and 12th International Workshop, WS-FM/BEAT 2015, Madrid, Spain, September 4-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860782024-06-17T14:15:32Z2024-06-17T14:15:32Zby Hildebrandt, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33612-1">https://doi.org/10.1007/978-3-319-33612-1</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861862024-06-17T14:15:32Z2024-06-17T14:15:32Zby Clark, Jeremy. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53357-4">https://doi.org/10.1007/978-3-662-53357-4</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850892024-06-17T14:15:32Z2024-06-17T14:15:32Zby Zhu, Quanyan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47413-7">https://doi.org/10.1007/978-3-319-47413-7</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857092024-06-17T14:15:32Z2024-06-17T14:15:32Zby Pointcheval, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31517-1">https://doi.org/10.1007/978-3-319-31517-1</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857262024-06-17T14:15:32Z2024-06-17T14:15:32Zby Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48965-0">https://doi.org/10.1007/978-3-319-48965-0</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858022024-06-17T14:15:32Z2024-06-17T14:15:32Zby Zikas, Vassilis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44618-9">https://doi.org/10.1007/978-3-319-44618-9</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858122024-06-17T14:15:32Z2024-06-17T14:15:32Zby Chen, Jiageng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46298-1">https://doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Modelling Foundations and Applications 12th European Conference, ECMFA 2016, Held as Part of STAF 2016, Vienna, Austria, July 6-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858202024-06-17T14:15:32Z2024-06-17T14:15:32Zby Wąsowski, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-319-42061-5">https://doi.org/10.1007/978-3-319-42061-5</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data and Processes 6th International Provenance and Annotation Workshop, IPAW 2016, McLean, VA, USA, June 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859962024-06-17T14:15:32Z2024-06-17T14:15:32Zby Mattoso, Marta. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40593-3">https://doi.org/10.1007/978-3-319-40593-3</a><br/>Format: Electronic Resources<br/>Software Technologies 10th International Joint Conference, ICSOFT 2015, Colmar, France, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849412024-06-17T14:15:32Z2024-06-17T14:15:32Zby Lorenz, Pascal. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30142-6">https://doi.org/10.1007/978-3-319-30142-6</a><br/>Format: Electronic Resources<br/>Agile Processes, in Software Engineering, and Extreme Programming 17th International Conference, XP 2016, Edinburgh, UK, May 24-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20846022024-06-17T14:15:32Z2024-06-17T14:15:32Zby Sharp, Helen. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33515-5">https://doi.org/10.1007/978-3-319-33515-5</a><br/>Format: Electronic Resources<br/>Shared Services and Outsourcing: A Contemporary Outlook 10th Global Sourcing Workshop 2016, Val d'Isère, France, February 16-19, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848462024-06-17T14:15:32Z2024-06-17T14:15:32Zby Kotlarsky, Julia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47009-2">https://doi.org/10.1007/978-3-319-47009-2</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20854392024-06-17T14:15:32Z2024-06-17T14:15:32Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format: Electronic Resources<br/>Testing Software and Systems 28th IFIP WG 6.1 International Conference, ICTSS 2016, Graz, Austria, October 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854412024-06-17T14:15:32Z2024-06-17T14:15:32Zby Wotawa, Franz. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47443-4">https://doi.org/10.1007/978-3-319-47443-4</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850972024-06-17T14:15:32Z2024-06-17T14:15:32Zby Rome, Erich. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33331-1">https://doi.org/10.1007/978-3-319-33331-1</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857322024-06-17T14:15:32Z2024-06-17T14:15:32Zby Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29360-8">https://doi.org/10.1007/978-3-319-29360-8</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854652024-06-17T14:15:32Z2024-06-17T14:15:32Zby Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45931-8">https://doi.org/10.1007/978-3-319-45931-8</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850152024-06-17T14:15:32Z2024-06-17T14:15:32Zby Caballero, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40667-1">https://doi.org/10.1007/978-3-319-40667-1</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850162024-06-17T14:15:32Z2024-06-17T14:15:32Zby Peyrin, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-52993-5">https://doi.org/10.1007/978-3-662-52993-5</a><br/>Format: Electronic Resources<br/>Formal SQL Tuning for Oracle Databases Practical Efficiency - Efficient Practiceent://SD_ILS/0/SD_ILS:20843652024-06-17T14:15:32Z2024-06-17T14:15:32Zby Nossov, Leonid. author.<br/><a href="https://doi.org/10.1007/978-3-662-50417-8">https://doi.org/10.1007/978-3-662-50417-8</a><br/>Format: Electronic Resources<br/>Product Lifecycle Management for Digital Transformation of Industries 13th IFIP WG 5.1 International Conference, PLM 2016, Columbia, SC, USA, July 11-13, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20841082024-06-17T14:15:32Z2024-06-17T14:15:32Zby Harik, Ramy. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54660-5">https://doi.org/10.1007/978-3-319-54660-5</a><br/>Format: Electronic Resources<br/>Evaluation of Novel Approaches to Software Engineering 11th International Conference, ENASE 2016, Rome, Italy, April 27–28, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20843672024-06-17T14:15:32Z2024-06-17T14:15:32Zby Maciaszek, Leszek A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56390-9">https://doi.org/10.1007/978-3-319-56390-9</a><br/>Format: Electronic Resources<br/>Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850362024-06-17T14:15:32Z2024-06-17T14:15:32Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format: Electronic Resources<br/>Advances in Computing Applicationsent://SD_ILS/0/SD_ILS:20844742024-06-17T14:15:32Z2024-06-17T14:15:32Zby Chakrabarti, Amlan. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2630-0">https://doi.org/10.1007/978-981-10-2630-0</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20852302024-06-17T14:15:32Z2024-06-17T14:15:32Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40367-0">https://doi.org/10.1007/978-3-319-40367-0</a><br/>Format: Electronic Resources<br/>Social, Cultural, and Behavioral Modeling 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28 - July 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852312024-06-17T14:15:32Z2024-06-17T14:15:32Zby Xu, Kevin S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39931-7">https://doi.org/10.1007/978-3-319-39931-7</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:20852462024-06-17T14:15:32Z2024-06-17T14:15:32Zby Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48671-0">https://doi.org/10.1007/978-3-319-48671-0</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854282024-06-17T14:15:32Z2024-06-17T14:15:32Zby Monrose, Fabian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45719-2">https://doi.org/10.1007/978-3-319-45719-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20857352024-06-17T14:15:32Z2024-06-17T14:15:32Zby Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49890-3">https://doi.org/10.1007/978-3-662-49890-3</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20856762024-06-17T14:15:32Z2024-06-17T14:15:32Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format: Electronic Resources<br/>Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859282024-06-17T14:15:32Z2024-06-17T14:15:32Zby Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46598-2">https://doi.org/10.1007/978-3-319-46598-2</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20856852024-06-17T14:15:32Z2024-06-17T14:15:32Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40253-6">https://doi.org/10.1007/978-3-319-40253-6</a><br/>Format: Electronic Resources<br/>Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20–22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859532024-06-17T14:15:32Z2024-06-17T14:15:32Zby Kim, Ho-won. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31875-2">https://doi.org/10.1007/978-3-319-31875-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20859622024-06-17T14:15:32Z2024-06-17T14:15:32Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53008-5">https://doi.org/10.1007/978-3-662-53008-5</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859802024-06-17T14:15:32Z2024-06-17T14:15:32Zby Katsikas, Sokratis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44341-6">https://doi.org/10.1007/978-3-319-44341-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20858002024-06-17T14:15:32Z2024-06-17T14:15:32Zby Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53890-6">https://doi.org/10.1007/978-3-662-53890-6</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858872024-06-17T14:15:32Z2024-06-17T14:15:32Zby Ogawa, Kazuto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format: Electronic Resources<br/>Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858882024-06-17T14:15:32Z2024-06-17T14:15:32Zby Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format: Electronic Resources<br/>Information Technology for Management Federated Conference on Computer Science and Information Systems, ISM 2015 and AITM 2015, Lodz, Poland, September 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20843342024-06-17T14:15:32Z2024-06-17T14:15:32Zby Ziemba, Ewa. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30528-8">https://doi.org/10.1007/978-3-319-30528-8</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842542024-06-17T14:15:32Z2024-06-17T14:15:32Zby Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format: Electronic Resources<br/>Tamed Agility Pragmatic Contracting and Collaboration in Agile Software Projectsent://SD_ILS/0/SD_ILS:20847682024-06-17T14:15:32Z2024-06-17T14:15:32Zby Book, Matthias. author.<br/><a href="https://doi.org/10.1007/978-3-319-41478-2">https://doi.org/10.1007/978-3-319-41478-2</a><br/>Format: Electronic Resources<br/>Software Process Improvement and Capability Determination 16th International Conference, SPICE 2016, Dublin, Ireland, June 9-10, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20846742024-06-17T14:15:32Z2024-06-17T14:15:32Zby Clarke, Paul M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-38980-6">https://doi.org/10.1007/978-3-319-38980-6</a><br/>Format: Electronic Resources<br/>Data Science and Big Data Computing Frameworks and Methodologiesent://SD_ILS/0/SD_ILS:20848742024-06-17T14:15:32Z2024-06-17T14:15:32Zby Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31861-5">https://doi.org/10.1007/978-3-319-31861-5</a><br/>Format: Electronic Resources<br/>Service-Oriented and Cloud Computing 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850822024-06-17T14:15:32Z2024-06-17T14:15:32Zby Aiello, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44482-6">https://doi.org/10.1007/978-3-319-44482-6</a><br/>Format: Electronic Resources<br/>Evaluation of Novel Approaches to Software Engineering 10th International Conference, ENASE 2015, Barcelona, Spain, April 29–30, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844142024-06-17T14:15:32Z2024-06-17T14:15:32Zby Maciaszek, Leszek A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30243-0">https://doi.org/10.1007/978-3-319-30243-0</a><br/>Format: Electronic Resources<br/>Software Architecture 10th European Conference, ECSA 2016, Copenhagen, Denmark, November 28 -- December 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852602024-06-17T14:15:32Z2024-06-17T14:15:32Zby Tekinerdogan, Bedir. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48992-6">https://doi.org/10.1007/978-3-319-48992-6</a><br/>Format: Electronic Resources<br/>Transactions on Modularity and Composition Ient://SD_ILS/0/SD_ILS:20858312024-06-17T14:15:32Z2024-06-17T14:15:32Zby Chiba, Shigeru. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46969-0">https://doi.org/10.1007/978-3-319-46969-0</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20858402024-06-17T14:15:32Z2024-06-17T14:15:32Zby Yang, Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-42836-9">https://doi.org/10.1007/978-3-319-42836-9</a><br/>Format: Electronic Resources<br/>FM 2016: Formal Methods 21st International Symposium, Limassol, Cyprus, November 9-11, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859582024-06-17T14:15:32Z2024-06-17T14:15:32Zby Fitzgerald, John. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48989-6">https://doi.org/10.1007/978-3-319-48989-6</a><br/>Format: Electronic Resources<br/>Requirements Engineering: Foundation for Software Quality 22nd International Working Conference, REFSQ 2016, Gothenburg, Sweden, March 14-17, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857012024-06-17T14:15:32Z2024-06-17T14:15:32Zby Daneva, Maya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30282-9">https://doi.org/10.1007/978-3-319-30282-9</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20857042024-06-17T14:15:32Z2024-06-17T14:15:32Zby Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49384-7">https://doi.org/10.1007/978-3-662-49384-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855852024-06-17T14:15:32Z2024-06-17T14:15:32Zby Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49896-5">https://doi.org/10.1007/978-3-662-49896-5</a><br/>Format: Electronic Resources<br/>Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:20857282024-06-17T14:15:32Z2024-06-17T14:15:32Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29883-2">https://doi.org/10.1007/978-3-319-29883-2</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857292024-06-17T14:15:32Z2024-06-17T14:15:32Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20857372024-06-17T14:15:32Z2024-06-17T14:15:32Zby Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49387-8">https://doi.org/10.1007/978-3-662-49387-8</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857132024-06-17T14:15:32Z2024-06-17T14:15:32Zby Standaert, François-Xavier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43283-0">https://doi.org/10.1007/978-3-319-43283-0</a><br/>Format: Electronic Resources<br/>Transactions on Computational Collective Intelligence XXVent://SD_ILS/0/SD_ILS:20857182024-06-17T14:15:32Z2024-06-17T14:15:32Zby Nguyen, Ngoc Thanh. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53580-6">https://doi.org/10.1007/978-3-662-53580-6</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing – ICSOC 2015 Workshops WESOA, RMSOC, ISC, DISCO, WESE, BSCI, FOR-MOVES, Goa, India, November 16-19, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20858682024-06-17T14:15:32Z2024-06-17T14:15:32Zby Norta, Alex. editor.<br/><a href="https://doi.org/10.1007/978-3-662-50539-7">https://doi.org/10.1007/978-3-662-50539-7</a><br/>Format: Electronic Resources<br/>Formal Methods: Foundations and Applications 19th Brazilian Symposium, SBMF 2016, Natal, Brazil, November 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856182024-06-17T14:15:32Z2024-06-17T14:15:32Zby Ribeiro, Leila. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49815-7">https://doi.org/10.1007/978-3-319-49815-7</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:20855262024-06-17T14:15:32Z2024-06-17T14:15:32Zby Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>Transactions on Foundations for Mastering Change Ient://SD_ILS/0/SD_ILS:20861172024-06-17T14:15:32Z2024-06-17T14:15:32Zby Steffen, Bernhard. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46508-1">https://doi.org/10.1007/978-3-319-46508-1</a><br/>Format: Electronic Resources<br/>Logistics and Supply Chain Innovation Bridging the Gap between Theory and Practiceent://SD_ILS/0/SD_ILS:20866922024-06-17T14:15:32Z2024-06-17T14:15:32Zby Zijm, Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-22288-2">https://doi.org/10.1007/978-3-319-22288-2</a><br/>Format: Electronic Resources<br/>Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861262024-06-17T14:15:32Z2024-06-17T14:15:32Zby Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:20857472024-06-17T14:15:32Z2024-06-17T14:15:32Zby Homma, Naofumi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31271-2">https://doi.org/10.1007/978-3-319-31271-2</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854062024-06-17T14:15:32Z2024-06-17T14:15:32Zby Lambrinoudakis, Costas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31811-0">https://doi.org/10.1007/978-3-319-31811-0</a><br/>Format: Electronic Resources<br/>Software Engineering for Resilient Systems 8th International Workshop, SERENE 2016, Gothenburg, Sweden, September 5-6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858982024-06-17T14:15:32Z2024-06-17T14:15:32Zby Crnkovic, Ivica. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45892-2">https://doi.org/10.1007/978-3-319-45892-2</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861432024-06-17T14:15:32Z2024-06-17T14:15:32Zby Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861442024-06-17T14:15:32Z2024-06-17T14:15:32Zby Bao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49151-6">https://doi.org/10.1007/978-3-319-49151-6</a><br/>Format: Electronic Resources<br/>The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthdayent://SD_ILS/0/SD_ILS:20861542024-06-17T14:15:32Z2024-06-17T14:15:32Zby Ryan, Peter Y. A. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49301-4">https://doi.org/10.1007/978-3-662-49301-4</a><br/>Format: Electronic Resources<br/>Formal Methods: Foundations and Applications 18th Brazilian Symposium, SBMF 2015, Belo Horizonte, Brazil, September 21-22, 2015, Proceedingsent://SD_ILS/0/SD_ILS:20861552024-06-17T14:15:32Z2024-06-17T14:15:32Zby Cornélio, Márcio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29473-5">https://doi.org/10.1007/978-3-319-29473-5</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861582024-06-17T14:15:32Z2024-06-17T14:15:32Zby Kwon, Soonhak. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30840-1">https://doi.org/10.1007/978-3-319-30840-1</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860702024-06-17T14:15:32Z2024-06-17T14:15:32Zby Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format: Electronic Resources<br/>Mobility Management Principle, Technology and Applicationsent://SD_ILS/0/SD_ILS:20865652024-06-17T14:15:32Z2024-06-17T14:15:32Zby Chen, Shanzhi. author.<br/><a href="https://doi.org/10.1007/978-3-662-52726-9">https://doi.org/10.1007/978-3-662-52726-9</a><br/>Format: Electronic Resources<br/>Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860872024-06-17T14:15:32Z2024-06-17T14:15:32Zby Livraga, Giovanni. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47072-6">https://doi.org/10.1007/978-3-319-47072-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860992024-06-17T14:15:32Z2024-06-17T14:15:32Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53018-4">https://doi.org/10.1007/978-3-662-53018-4</a><br/>Format: Electronic Resources<br/>Computer and Information Scienceent://SD_ILS/0/SD_ILS:20873062024-06-17T14:15:32Z2024-06-17T14:15:32Zby Lee, Roger. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40171-3">https://doi.org/10.1007/978-3-319-40171-3</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20860792024-06-17T14:15:32Z2024-06-17T14:15:32Zby Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format: Electronic Resources<br/>Mathematical and Engineering Methods in Computer Science 10th International Doctoral Workshop, MEMICS 2015, Telč, Czech Republic, October 23–25, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20855252024-06-17T14:15:32Z2024-06-17T14:15:32Zby Kofroň, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29817-7">https://doi.org/10.1007/978-3-319-29817-7</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860952024-06-17T14:15:32Z2024-06-17T14:15:32Zby Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format: Electronic Resources<br/>Electronic Government and the Information Systems Perspective 5th International Conference, EGOVIS 2016, Porto, Portugal, September 5-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20862082024-06-17T14:15:32Z2024-06-17T14:15:32Zby Kő, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44159-7">https://doi.org/10.1007/978-3-319-44159-7</a><br/>Format: Electronic Resources<br/>Enterprise Interoperability VII Enterprise Interoperability in the Digitized and Networked Factory of the Futureent://SD_ILS/0/SD_ILS:20876942024-06-17T14:15:32Z2024-06-17T14:15:32Zby Mertins, Kai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30957-6">https://doi.org/10.1007/978-3-319-30957-6</a><br/>Format: Electronic Resources<br/>High Confidence Software Reuse in Large Systems 10th International Conference on Software Reuse, ICSR 2008, Beijing, China, May 25-29, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026132024-06-17T14:15:32Z2024-06-17T14:15:32Zby Mei, Hong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68073-4">http://dx.doi.org/10.1007/978-3-540-68073-4</a><br/>Format: Electronic Resources<br/>Service Availability 5th International Service Availability Symposium, ISAS 2008 Tokyo, Japan, May 19-21, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026202024-06-17T14:15:32Z2024-06-17T14:15:32Zby Nanya, Takashi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68129-8">http://dx.doi.org/10.1007/978-3-540-68129-8</a><br/>Format: Electronic Resources<br/>Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028122024-06-17T14:15:32Z2024-06-17T14:15:32Zby Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70567-3">http://dx.doi.org/10.1007/978-3-540-70567-3</a><br/>Format: Electronic Resources<br/>Advanced Methods for Inconsistent Knowledge Managementent://SD_ILS/0/SD_ILS:5024342024-06-17T14:15:32Z2024-06-17T14:15:32Zby Nguyen, Ngoc Thanh. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-889-0">http://dx.doi.org/10.1007/978-1-84628-889-0</a><br/>Format: Electronic Resources<br/>Itil® Version 3 at a Glance Information Quick Referenceent://SD_ILS/0/SD_ILS:5019182024-06-17T14:15:32Z2024-06-17T14:15:32Zby Long, John O. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77393-3">http://dx.doi.org/10.1007/978-0-387-77393-3</a><br/>Format: Electronic Resources<br/>Model Driven Architecture – Foundations and Applications 4th European Conference, ECMDA-FA 2008, Berlin, Germany, June 9-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027092024-06-17T14:15:32Z2024-06-17T14:15:32Zby Schieferdecker, Ina. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69100-6">http://dx.doi.org/10.1007/978-3-540-69100-6</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2008 First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026232024-06-17T14:15:32Z2024-06-17T14:15:32Zby Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68164-9">http://dx.doi.org/10.1007/978-3-540-68164-9</a><br/>Format: Electronic Resources<br/>The IT Measurement Compendium Estimating and Benchmarking Success with Functional Size Measurementent://SD_ILS/0/SD_ILS:5026272024-06-17T14:15:32Z2024-06-17T14:15:32Zby Bundschuh, Manfred. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68188-5">http://dx.doi.org/10.1007/978-3-540-68188-5</a><br/>Format: Electronic Resources<br/>Guide to Advanced Empirical Software Engineeringent://SD_ILS/0/SD_ILS:5024682024-06-17T14:15:32Z2024-06-17T14:15:32Zby Shull, Forrest. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-044-5">http://dx.doi.org/10.1007/978-1-84800-044-5</a><br/>Format: Electronic Resources<br/>Advances in Ad Hoc Networking Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25–27, 2008ent://SD_ILS/0/SD_ILS:5015232024-06-17T14:15:32Z2024-06-17T14:15:32Zby Cuenca, Pedro. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09490-8">http://dx.doi.org/10.1007/978-0-387-09490-8</a><br/>Format: Electronic Resources<br/>Open Source Development, Communities and Quality IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:5015432024-06-17T14:15:32Z2024-06-17T14:15:32Zby Russo, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09684-1">http://dx.doi.org/10.1007/978-0-387-09684-1</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IIIent://SD_ILS/0/SD_ILS:5026992024-06-17T14:15:32Z2024-06-17T14:15:32Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format: Electronic Resources<br/>Models in Software Engineering Workshops and Symposia at MoDELS 2007, Nashville, TN, USA, September 30 - October 5, 2007, Reports and Revised Selected Papersent://SD_ILS/0/SD_ILS:5027062024-06-17T14:15:32Z2024-06-17T14:15:32Zby Giese, Holger. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69073-3">http://dx.doi.org/10.1007/978-3-540-69073-3</a><br/>Format: Electronic Resources<br/>Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027502024-06-17T14:15:32Z2024-06-17T14:15:32Zby Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format: Electronic Resources<br/>Resources, Co-Evolution and Artifacts Theory in CSCWent://SD_ILS/0/SD_ILS:5024352024-06-17T14:15:32Z2024-06-17T14:15:32Zby Ackerman, Mark S. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-901-9">http://dx.doi.org/10.1007/978-1-84628-901-9</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection IIent://SD_ILS/0/SD_ILS:5020092024-06-17T14:15:32Z2024-06-17T14:15:32Zby Papa, Mauricio. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-88523-0">http://dx.doi.org/10.1007/978-0-387-88523-0</a><br/>Format: Electronic Resources<br/>Resilient Networks and Services Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028182024-06-17T14:15:32Z2024-06-17T14:15:32Zby Hausheer, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70587-1">http://dx.doi.org/10.1007/978-3-540-70587-1</a><br/>Format: Electronic Resources<br/>Enterprise Interoperability III New Challenges and Industrial Approachesent://SD_ILS/0/SD_ILS:5025252024-06-17T14:15:32Z2024-06-17T14:15:32Zby Mertins, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-221-0">http://dx.doi.org/10.1007/978-1-84800-221-0</a><br/>Format: Electronic Resources<br/>ECOOP 2008 – Object-Oriented Programming 22nd European Conference Paphos, Cyprus, July 7-11, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028202024-06-17T14:15:32Z2024-06-17T14:15:32Zby Vitek, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70592-5">http://dx.doi.org/10.1007/978-3-540-70592-5</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027562024-06-17T14:15:32Z2024-06-17T14:15:32Zby Mjølsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69485-4">http://dx.doi.org/10.1007/978-3-540-69485-4</a><br/>Format: Electronic Resources<br/>Objects, Components, Models and Patterns 46th International Conference, TOOLS EUROPE 2008, Zurich, Switzerland, June 30 - July 4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027772024-06-17T14:15:32Z2024-06-17T14:15:32Zby Paige, Richard F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69824-1">http://dx.doi.org/10.1007/978-3-540-69824-1</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5036102024-06-17T14:15:32Z2024-06-17T14:15:32Zby Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format: Electronic Resources<br/>Software Process and Product Measurement International Conferences IWSM 2008, Metrikon 2008, and Mensura 2008 Munich, Germany, November 18-19, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038092024-06-17T14:15:32Z2024-06-17T14:15:32Zby Dumke, Reiner R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89403-2">http://dx.doi.org/10.1007/978-3-540-89403-2</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5035332024-06-17T14:15:32Z2024-06-17T14:15:32Zby Pei, Dingyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038182024-06-17T14:15:32Z2024-06-17T14:15:32Zby Matsuura, Kanta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format: Electronic Resources<br/>Model Driven Engineering Languages and Systems 11th International Conference, MoDELS 2008, Toulouse, France, September 28 - October 3, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037242024-06-17T14:15:32Z2024-06-17T14:15:32Zby Czarnecki, Krzysztof. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87875-9">http://dx.doi.org/10.1007/978-3-540-87875-9</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038212024-06-17T14:15:32Z2024-06-17T14:15:32Zby Franklin, Matthew K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part Ient://SD_ILS/0/SD_ILS:5036362024-06-17T14:15:32Z2024-06-17T14:15:32Zby Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85563-7">http://dx.doi.org/10.1007/978-3-540-85563-7</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5036372024-06-17T14:15:32Z2024-06-17T14:15:32Zby Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85565-1">http://dx.doi.org/10.1007/978-3-540-85565-1</a><br/>Format: Electronic Resources<br/>Public Key Cryptography – PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033722024-06-17T14:15:32Z2024-06-17T14:15:32Zby Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format: Electronic Resources<br/>Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5033752024-06-17T14:15:32Z2024-06-17T14:15:32Zby Bonchi, Francesco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78478-4">http://dx.doi.org/10.1007/978-3-540-78478-4</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038432024-06-17T14:15:32Z2024-06-17T14:15:32Zby Ortiz-Arroyo, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89900-6">http://dx.doi.org/10.1007/978-3-540-89900-6</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data and Processes Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake City, UT, USA, June 17-18, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5038462024-06-17T14:15:32Z2024-06-17T14:15:32Zby Freire, Juliana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89965-5">http://dx.doi.org/10.1007/978-3-540-89965-5</a><br/>Format: Electronic Resources<br/>Principles of Distributed Systems 12th International Conference, OPODIS 2008, Luxor, Egypt, December 15-18, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038572024-06-17T14:15:32Z2024-06-17T14:15:32Zby Baker, Theodore P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92221-6">http://dx.doi.org/10.1007/978-3-540-92221-6</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036842024-06-17T14:15:32Z2024-06-17T14:15:32Zby Lippmann, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036002024-06-17T14:15:32Z2024-06-17T14:15:32Zby Wagner, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format: Electronic Resources<br/>Data Management in Grid and Peer-to-Peer Systems First International Conference, Globe 2008, Turin, Italy, September 3, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036012024-06-17T14:15:32Z2024-06-17T14:15:32Zby Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85176-9">http://dx.doi.org/10.1007/978-3-540-85176-9</a><br/>Format: Electronic Resources<br/>Electronic Government 7th International Conference, EGOV 2008, Turin, Italy, August 31 - September 5, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036052024-06-17T14:15:32Z2024-06-17T14:15:32Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85204-9">http://dx.doi.org/10.1007/978-3-540-85204-9</a><br/>Format: Electronic Resources<br/>Policies and Research in Identity Management First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007ent://SD_ILS/0/SD_ILS:5019392024-06-17T14:15:32Z2024-06-17T14:15:32Zby Leeuw, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77996-6">http://dx.doi.org/10.1007/978-0-387-77996-6</a><br/>Format: Electronic Resources<br/>Requirements Management The Interface Between Requirements Development and All Other Systems Engineering Processesent://SD_ILS/0/SD_ILS:5026462024-06-17T14:15:32Z2024-06-17T14:15:32Zby Hood, Colin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68476-3">http://dx.doi.org/10.1007/978-3-540-68476-3</a><br/>Format: Electronic Resources<br/>Testing of Software and Communicating Systems 20th IFIP TC 6/WG 6.1 International Conference, TestCom 2008 8th International Workshop, FATES 2008 Tokyo, Japan, June 10-13, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026522024-06-17T14:15:32Z2024-06-17T14:15:32Zby Suzuki, Kenji. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68524-1">http://dx.doi.org/10.1007/978-3-540-68524-1</a><br/>Format: Electronic Resources<br/>Pervasive Collaborative Networks IFIP TC 5 WG 5.5 Ninth Working Conference on VIRTUAL ENTERPRISES, September 8-10, 2008, Poznan, Polandent://SD_ILS/0/SD_ILS:5019982024-06-17T14:15:32Z2024-06-17T14:15:32Zby Camarinha-Matos, Luis M. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-84837-2">http://dx.doi.org/10.1007/978-0-387-84837-2</a><br/>Format: Electronic Resources<br/>Reliable Software Technologies – Ada-Europe 2008 13th Ada-Europe International Conference on Reliable Software Technologies, Venice, Italy, June 16-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026622024-06-17T14:15:32Z2024-06-17T14:15:32Zby Kordon, Fabrice. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68624-8">http://dx.doi.org/10.1007/978-3-540-68624-8</a><br/>Format: Electronic Resources<br/>Object-Oriented Technology. ECOOP 2007 Workshop Reader ECOOP 2007 Workshops, Berlin, Germany, July 30-31, 2007, Final Reportsent://SD_ILS/0/SD_ILS:5033352024-06-17T14:15:32Z2024-06-17T14:15:32Zby Cebulla, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78195-0">http://dx.doi.org/10.1007/978-3-540-78195-0</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027932024-06-17T14:15:32Z2024-06-17T14:15:32Zby Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format: Electronic Resources<br/>Software Process and Product Measurement International Conference, IWSM-Mensura 2007, Palma de Mallorca, Spain, November 5-8, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5036342024-06-17T14:15:32Z2024-06-17T14:15:32Zby Cuadrado-Gallego, Juan J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85553-8">http://dx.doi.org/10.1007/978-3-540-85553-8</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5028032024-06-17T14:15:32Z2024-06-17T14:15:32Zby Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format: Electronic Resources<br/>Model-Driven Testingent://SD_ILS/0/SD_ILS:5028922024-06-17T14:15:32Z2024-06-17T14:15:32Zby Baker, Paul. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72563-3">http://dx.doi.org/10.1007/978-3-540-72563-3</a><br/>Format: Electronic Resources<br/>Making Globally Distributed Software Development a Success Story International Conference on Software Process, ICSP 2008 Leipzig, Germany, May 10-11, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5035442024-06-17T14:15:32Z2024-06-17T14:15:32Zby Wang, Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79588-9">http://dx.doi.org/10.1007/978-3-540-79588-9</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036642024-06-17T14:15:32Z2024-06-17T14:15:32Zby Grimaud, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format: Electronic Resources<br/>Managing Large-Scale Service Deployment 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036782024-06-17T14:15:32Z2024-06-17T14:15:32Zby Turck, Filip. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87353-2">http://dx.doi.org/10.1007/978-3-540-87353-2</a><br/>Format: Electronic Resources<br/>Modelling Autonomic Communications Environments Third IEEE International Workshop, MACE 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036792024-06-17T14:15:32Z2024-06-17T14:15:32Zby Meer, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87355-6">http://dx.doi.org/10.1007/978-3-540-87355-6</a><br/>Format: Electronic Resources<br/>IP Operations and Management 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036802024-06-17T14:15:32Z2024-06-17T14:15:32Zby Akar, Nail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87357-0">http://dx.doi.org/10.1007/978-3-540-87357-0</a><br/>Format: Electronic Resources<br/>Modelling, Computation and Optimization in Information Systems and Management Sciences Second International Conference MCO 2008, Metz, France - Luxembourg, September 8-10, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036922024-06-17T14:15:32Z2024-06-17T14:15:32Zby Le Thi, Hoai An. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87477-5">http://dx.doi.org/10.1007/978-3-540-87477-5</a><br/>Format: Electronic Resources<br/>Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035862024-06-17T14:15:32Z2024-06-17T14:15:32Zby Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format: Electronic Resources<br/>Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:5037892024-06-17T14:15:32Z2024-06-17T14:15:32Zby Solanki, Kaushal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format: Electronic Resources<br/>Business Process Management Workshops BPM 2007 International Workshops, BPI, BPD, CBP, ProHealth, RefMod, semantics4ws, Brisbane, Australia, September 24, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5033392024-06-17T14:15:32Z2024-06-17T14:15:32Zby Hofstede, Arthur. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78238-4">http://dx.doi.org/10.1007/978-3-540-78238-4</a><br/>Format: Electronic Resources<br/>Active Knowledge Modeling of Enterprisesent://SD_ILS/0/SD_ILS:5035192024-06-17T14:15:32Z2024-06-17T14:15:32Zby Lillehagen, Frank. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79416-5">http://dx.doi.org/10.1007/978-3-540-79416-5</a><br/>Format: Electronic Resources<br/>Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036132024-06-17T14:15:32Z2024-06-17T14:15:32Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85259-9">http://dx.doi.org/10.1007/978-3-540-85259-9</a><br/>Format: Electronic Resources<br/>Rationale-Based Software Engineeringent://SD_ILS/0/SD_ILS:5032702024-06-17T14:15:32Z2024-06-17T14:15:32Zby Burge, Janet E. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77583-6">http://dx.doi.org/10.1007/978-3-540-77583-6</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:5036382024-06-17T14:15:32Z2024-06-17T14:15:32Zby Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85567-5">http://dx.doi.org/10.1007/978-3-540-85567-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2008 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5034552024-06-17T14:15:32Z2024-06-17T14:15:32Zby Smart, Nigel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78967-3">http://dx.doi.org/10.1007/978-3-540-78967-3</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038322024-06-17T14:15:32Z2024-06-17T14:15:32Zby Chowdhury, Dipanwita Roy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89754-5">http://dx.doi.org/10.1007/978-3-540-89754-5</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5036492024-06-17T14:15:32Z2024-06-17T14:15:32Zby Furnell, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format: Electronic Resources<br/>Business Process Management 6th International Conference, BPM 2008, Milan, Italy, September 2-4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036502024-06-17T14:15:32Z2024-06-17T14:15:32Zby Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85758-7">http://dx.doi.org/10.1007/978-3-540-85758-7</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036602024-06-17T14:15:32Z2024-06-17T14:15:32Zby Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format: Electronic Resources<br/>Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037492024-06-17T14:15:32Z2024-06-17T14:15:32Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037532024-06-17T14:15:32Z2024-06-17T14:15:32Zby Buchmann, Johannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5034812024-06-17T14:15:32Z2024-06-17T14:15:32Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format: Electronic Resources<br/>Emerging Web Services Technology, Volume IIent://SD_ILS/0/SD_ILS:5039422024-06-17T14:15:32Z2024-06-17T14:15:32Zby Gschwind, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-7643-8864-5">http://dx.doi.org/10.1007/978-3-7643-8864-5</a><br/>Format: Electronic Resources<br/>Web Services and Formal Methods 4th International Workshop, WS-FM 2007, Brisbane, Australia, September 28-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5034962024-06-17T14:15:32Z2024-06-17T14:15:32Zby Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79230-7">http://dx.doi.org/10.1007/978-3-540-79230-7</a><br/>Format: Electronic Resources<br/>Rightshore! Successfully SAP(R) Projects Offshoreent://SD_ILS/0/SD_ILS:5032262024-06-17T14:15:32Z2024-06-17T14:15:32Zby Messner, Wolfgang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77288-0">http://dx.doi.org/10.1007/978-3-540-77288-0</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037082024-06-17T14:15:32Z2024-06-17T14:15:32Zby Harrison, Michael D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format: Electronic Resources<br/>Balancing Agility and Formalism in Software Engineering Second IFIP TC 2 Central and East European Conference on Software Engineering Techniques, CEE-SET 2007, Poznan, Poland, October 10-12, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5036152024-06-17T14:15:32Z2024-06-17T14:15:32Zby Meyer, Bertrand. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85279-7">http://dx.doi.org/10.1007/978-3-540-85279-7</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks in Pattern Recognition Third IAPR Workshop, ANNPR 2008 Paris, France, July 2-4, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027912024-06-17T14:15:32Z2024-06-17T14:15:32Zby Prevost, Lionel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69939-2">http://dx.doi.org/10.1007/978-3-540-69939-2</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2008 The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035032024-06-17T14:15:32Z2024-06-17T14:15:32Zby Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79263-5">http://dx.doi.org/10.1007/978-3-540-79263-5</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5037932024-06-17T14:15:32Z2024-06-17T14:15:32Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format: Electronic Resources<br/>The Practice of Enterprise Modeling First IFIP WG 8.1 Working Conference, PoEM 2008, Stockholm, Sweden, November 12-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037962024-06-17T14:15:32Z2024-06-17T14:15:32Zby Stirna, Janis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89218-2">http://dx.doi.org/10.1007/978-3-540-89218-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038002024-06-17T14:15:32Z2024-06-17T14:15:32Zby Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format: Electronic Resources<br/>Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:5015462024-06-17T14:15:32Z2024-06-17T14:15:32Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Electronic Resources<br/>FM 2008: Formal Methods 15th International Symposium on Formal Methods, Turku, Finland, May 26-30, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026332024-06-17T14:15:32Z2024-06-17T14:15:32Zby Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68237-0">http://dx.doi.org/10.1007/978-3-540-68237-0</a><br/>Format: Electronic Resources<br/>Agile Processes in Software Engineering and Extreme Programming 9th International Conference, XP 2008, Limerick, Ireland, June 10-14, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026342024-06-17T14:15:32Z2024-06-17T14:15:32Zby Abrahamsson, Pekka. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68255-4">http://dx.doi.org/10.1007/978-3-540-68255-4</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028272024-06-17T14:15:32Z2024-06-17T14:15:32Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027302024-06-17T14:15:32Z2024-06-17T14:15:32Zby Rong, Chunming. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69295-9">http://dx.doi.org/10.1007/978-3-540-69295-9</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026912024-06-17T14:15:32Z2024-06-17T14:15:32Zby Bellovin, Steven M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Electronic Resources<br/>Requirements Engineering: Foundation for Software Quality 14th International Working Conference, REFSQ 2008 Montpellier, France, June 16-17, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027042024-06-17T14:15:32Z2024-06-17T14:15:32Zby Paech, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69062-7">http://dx.doi.org/10.1007/978-3-540-69062-7</a><br/>Format: Electronic Resources<br/>Software Evolutionent://SD_ILS/0/SD_ILS:5031722024-06-17T14:15:32Z2024-06-17T14:15:32Zby Mens, Tom. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76440-3">http://dx.doi.org/10.1007/978-3-540-76440-3</a><br/>Format: Electronic Resources<br/>Product-Focused Software Process Improvement 9th International Conference, PROFES 2008 Monte Porzio Catone, Italy, June 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027642024-06-17T14:15:32Z2024-06-17T14:15:32Zby Jedlitschka, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69566-0">http://dx.doi.org/10.1007/978-3-540-69566-0</a><br/>Format: Electronic Resources<br/>TestGoal Result-Driven Testingent://SD_ILS/0/SD_ILS:5034392024-06-17T14:15:32Z2024-06-17T14:15:32Zby De Grood, Derk-Jan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78829-4">http://dx.doi.org/10.1007/978-3-540-78829-4</a><br/>Format: Electronic Resources<br/>Emerging Technologies and Information Systems for the Knowledge Society First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037172024-06-17T14:15:32Z2024-06-17T14:15:32Zby Lytras, Miltiadis D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87781-3">http://dx.doi.org/10.1007/978-3-540-87781-3</a><br/>Format: Electronic Resources<br/>The Open Knowlege Society. A Computer Science and Information Systems Manifesto First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037182024-06-17T14:15:32Z2024-06-17T14:15:32Zby Lytras, Miltiadis D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87783-7">http://dx.doi.org/10.1007/978-3-540-87783-7</a><br/>Format: Electronic Resources<br/>Software Technologies for Embedded and Ubiquitous Systems 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037192024-06-17T14:15:32Z2024-06-17T14:15:32Zby Brinkschulte, Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87785-1">http://dx.doi.org/10.1007/978-3-540-87785-1</a><br/>Format: Electronic Resources<br/>Formal Methods and Testing An Outcome of the FORTEST Network, Revised Selected Papersent://SD_ILS/0/SD_ILS:5034492024-06-17T14:15:32Z2024-06-17T14:15:32Zby Hierons, Robert M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78917-8">http://dx.doi.org/10.1007/978-3-540-78917-8</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035632024-06-17T14:15:32Z2024-06-17T14:15:32Zby Onieva, Jose A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format: Electronic Resources<br/>Biosurveillance and Biosecurity International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038312024-06-17T14:15:32Z2024-06-17T14:15:32Zby Zeng, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89746-0">http://dx.doi.org/10.1007/978-3-540-89746-0</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033872024-06-17T14:15:32Z2024-06-17T14:15:32Zby Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format: Electronic Resources<br/>Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038392024-06-17T14:15:32Z2024-06-17T14:15:32Zby Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038052024-06-17T14:15:32Z2024-06-17T14:15:32Zby Kulkarni, Sandeep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89335-6">http://dx.doi.org/10.1007/978-3-540-89335-6</a><br/>Format: Electronic Resources<br/>Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5122762024-06-17T14:15:32Z2024-06-17T14:15:32Zby Lee, Jae Kwang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124402024-06-17T14:15:32Z2024-06-17T14:15:32Zby Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5123622024-06-17T14:15:32Z2024-06-17T14:15:32Zby Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71549-8">http://dx.doi.org/10.1007/978-3-540-71549-8</a><br/>Format: Electronic Resources<br/>Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126262024-06-17T14:15:32Z2024-06-17T14:15:32Zby Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Format: Electronic Resources<br/>Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130172024-06-17T14:15:32Z2024-06-17T14:15:32Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77156-2">http://dx.doi.org/10.1007/978-3-540-77156-2</a><br/>Format: Electronic Resources<br/>Testing of Software and Communicating Systems 19th IFIP TC6/WG6.1 International Conference, TestCom 2007, 7th International Workshop, FATES 2007, Tallinn, Estonia, June 26-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125892024-06-17T14:15:32Z2024-06-17T14:15:32Zby Petrenko, Alexandre. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73066-8">http://dx.doi.org/10.1007/978-3-540-73066-8</a><br/>Format: Electronic Resources<br/>Business Information Systems 10th International Conference, BIS 2007, Poznan, Poland, April 25-27, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124292024-06-17T14:15:32Z2024-06-17T14:15:32Zby Abramowicz, Witold. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72035-5">http://dx.doi.org/10.1007/978-3-540-72035-5</a><br/>Format: Electronic Resources<br/>Active Networks IFIP TC6 6th International Working Conference, IWAN 2004, Lawrence, KS, USA, October 27-29, 2004. Revised Papersent://SD_ILS/0/SD_ILS:5123522024-06-17T14:15:32Z2024-06-17T14:15:32Zby Minden, Gary J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71500-9">http://dx.doi.org/10.1007/978-3-540-71500-9</a><br/>Format: Electronic Resources<br/>Successfully Implementing Microsoft Dynamics™ by Using the Regatta® Approach for Microsoft Dynamics™ent://SD_ILS/0/SD_ILS:5123702024-06-17T14:15:32Z2024-06-17T14:15:32Zby Koop, Reinder. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71593-1">http://dx.doi.org/10.1007/978-3-540-71593-1</a><br/>Format: Electronic Resources<br/>Software Measurement Establish — Extract — Evaluate — Executeent://SD_ILS/0/SD_ILS:5123782024-06-17T14:15:32Z2024-06-17T14:15:32Zby Ebert, Christof. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71649-5">http://dx.doi.org/10.1007/978-3-540-71649-5</a><br/>Format: Electronic Resources<br/>Public Key Cryptography – PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5123812024-06-17T14:15:32Z2024-06-17T14:15:32Zby Okamoto, Tatsuaki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format: Electronic Resources<br/>Business Intelligence for the Real-Time Enterprises First International Workshop, BIRTE 2006, Seoul, Korea, September 11, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5127392024-06-17T14:15:32Z2024-06-17T14:15:32Zby Bussler, Christoph. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73950-0">http://dx.doi.org/10.1007/978-3-540-73950-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124922024-06-17T14:15:32Z2024-06-17T14:15:32Zby Naor, Moni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72540-4">http://dx.doi.org/10.1007/978-3-540-72540-4</a><br/>Format: Electronic Resources<br/>Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papersent://SD_ILS/0/SD_ILS:5127562024-06-17T14:15:32Z2024-06-17T14:15:32Zby Camenisch, Jan L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format: Electronic Resources<br/>IP Operations and Management 7th IEEE International Workshop, IPOM 2007 San José, USA, October 31 - November 2, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129422024-06-17T14:15:32Z2024-06-17T14:15:32Zby Medhi, Deep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75853-2">http://dx.doi.org/10.1007/978-3-540-75853-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127612024-06-17T14:15:32Z2024-06-17T14:15:32Zby Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127772024-06-17T14:15:32Z2024-06-17T14:15:32Zby Kruegel, Christopher. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74320-0">http://dx.doi.org/10.1007/978-3-540-74320-0</a><br/>Format: Electronic Resources<br/>Computational Intelligence and Security International Conference, CIS 2006. Guangzhou, China, November 3-6, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:5127822024-06-17T14:15:32Z2024-06-17T14:15:32Zby Wang, Yuping. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74377-4">http://dx.doi.org/10.1007/978-3-540-74377-4</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design IV FOSAD 2006/2007 Tutorial Lecturesent://SD_ILS/0/SD_ILS:5128372024-06-17T14:15:32Z2024-06-17T14:15:32Zby Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74810-6">http://dx.doi.org/10.1007/978-3-540-74810-6</a><br/>Format: Electronic Resources<br/>Electronic Government 6th International Conference, EGOV 2007, Regensburg, Germany, September 3-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127882024-06-17T14:15:32Z2024-06-17T14:15:32Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74444-3">http://dx.doi.org/10.1007/978-3-540-74444-3</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:5127932024-06-17T14:15:32Z2024-06-17T14:15:32Zby Biham, Eli. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part Ient://SD_ILS/0/SD_ILS:5128402024-06-17T14:15:32Z2024-06-17T14:15:32Zby Apolloni, Bruno. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74819-9">http://dx.doi.org/10.1007/978-3-540-74819-9</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part IIent://SD_ILS/0/SD_ILS:5128432024-06-17T14:15:32Z2024-06-17T14:15:32Zby Apolloni, Bruno. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74827-4">http://dx.doi.org/10.1007/978-3-540-74827-4</a><br/>Format: Electronic Resources<br/>Advances in Biometrics International Conference, ICB 2007, Seoul, Korea, August 27-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128032024-06-17T14:15:32Z2024-06-17T14:15:32Zby Lee, Seong-Whan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74549-5">http://dx.doi.org/10.1007/978-3-540-74549-5</a><br/>Format: Electronic Resources<br/>Grid Computing Securityent://SD_ILS/0/SD_ILS:5116722024-06-17T14:15:32Z2024-06-17T14:15:32Zby Chakrabarti, Anirban. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format: Electronic Resources<br/>Software Product Lines in Action The Best Industrial Practice in Product Line Engineeringent://SD_ILS/0/SD_ILS:5123412024-06-17T14:15:32Z2024-06-17T14:15:32Zby Linden, Frank. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71437-8">http://dx.doi.org/10.1007/978-3-540-71437-8</a><br/>Format: Electronic Resources<br/>