Search Results for - Narrowed by: 2005 - Computers and Society. - Management of Computing and Information Systems.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026qf$003dSUBJECT$002509Subject$002509Computers$002band$002bSociety.$002509Computers$002band$002bSociety.$0026qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026ps$003d300?2024-06-20T19:47:14ZPerspectives and Policies on ICT in Society An IFIP TC9 (Computers and Society) Handbookent://SD_ILS/0/SD_ILS:5044162024-06-20T19:47:14Z2024-06-20T19:47:14Zby Berleur, Jacques. editor.<br/><a href="http://dx.doi.org/10.1007/b135654">http://dx.doi.org/10.1007/b135654</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 – March 3, 2005. Revised Papersent://SD_ILS/0/SD_ILS:5101322024-06-20T19:47:14Z2024-06-20T19:47:14Zby Patrick, Andrew S. editor.<br/><a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format: Electronic Resources<br/>Electronic Government 4th International Conference, EGOV 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101632024-06-20T19:47:14Z2024-06-20T19:47:14Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/11545156">http://dx.doi.org/10.1007/11545156</a><br/>Format: Electronic Resources<br/>Trust, Privacy, and Security in Digital Business Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101862024-06-20T19:47:14Z2024-06-20T19:47:14Zby Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/11537878">http://dx.doi.org/10.1007/11537878</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104242024-06-20T19:47:14Z2024-06-20T19:47:14Zby Kantor, Paul. editor.<br/><a href="http://dx.doi.org/10.1007/b136511">http://dx.doi.org/10.1007/b136511</a><br/>Format: Electronic Resources<br/>Software Product Lines 9th International Conference, SPLC 2005, Rennes, France, September 26-29, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104252024-06-20T19:47:14Z2024-06-20T19:47:14Zby Obbink, Henk. editor.<br/><a href="http://dx.doi.org/10.1007/11554844">http://dx.doi.org/10.1007/11554844</a><br/>Format: Electronic Resources<br/>Advances in Biometrics International Conference, ICB 2006, Hong Kong, China, January 5-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5100932024-06-20T19:47:14Z2024-06-20T19:47:14Zby Zhang, David. editor.<br/><a href="http://dx.doi.org/10.1007/11608288">http://dx.doi.org/10.1007/11608288</a><br/>Format: Electronic Resources<br/>Audio- and Video-Based Biometric Person Authentication 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5100992024-06-20T19:47:14Z2024-06-20T19:47:14Zby Kanade, Takeo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-31638-1">http://dx.doi.org/10.1007/978-3-540-31638-1</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5103312024-06-20T19:47:14Z2024-06-20T19:47:14Zby Martin, David. editor.<br/><a href="http://dx.doi.org/10.1007/b136164">http://dx.doi.org/10.1007/b136164</a><br/>Format: Electronic Resources<br/>Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5106482024-06-20T19:47:14Z2024-06-20T19:47:14Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5106502024-06-20T19:47:14Z2024-06-20T19:47:14Zby Feng, Dengguo. editor.<br/><a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format: Electronic Resources<br/>Software Process Improvement 12th European Conference, EuroSPI 2005, Budapest, Hungary, November 9-11, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105472024-06-20T19:47:14Z2024-06-20T19:47:14Zby Richardson, Ita. editor.<br/><a href="http://dx.doi.org/10.1007/11586012">http://dx.doi.org/10.1007/11586012</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105722024-06-20T19:47:14Z2024-06-20T19:47:14Zby Desmedt, Yvo G. editor.<br/><a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format: Electronic Resources<br/>Business Process Management 3rd International Conference, BPM 2005, Nancy, France, September 5-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103012024-06-20T19:47:14Z2024-06-20T19:47:14Zby Aalst, Wil M. P. editor.<br/><a href="http://dx.doi.org/10.1007/11538394">http://dx.doi.org/10.1007/11538394</a><br/>Format: Electronic Resources<br/>Extreme Programming and Agile Processes in Software Engineering 6th International Conference, XP 2005, Sheffield, UK, June 18-23, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5099692024-06-20T19:47:14Z2024-06-20T19:47:14Zby Baumeister, Hubert. editor.<br/><a href="http://dx.doi.org/10.1007/b137278">http://dx.doi.org/10.1007/b137278</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5100632024-06-20T19:47:14Z2024-06-20T19:47:14Zby Chadwick, David. editor.<br/><a href="http://dx.doi.org/10.1007/11533733">http://dx.doi.org/10.1007/11533733</a><br/>Format: Electronic Resources<br/>Digital Watermarking Third International Workshop, IWDW 2004, Seoul, South Korea, October 30 - November 1, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5101892024-06-20T19:47:14Z2024-06-20T19:47:14Zby Cox, Ingemar J. editor.<br/><a href="http://dx.doi.org/10.1007/b106346">http://dx.doi.org/10.1007/b106346</a><br/>Format: Electronic Resources<br/>Digital Watermarking 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104152024-06-20T19:47:14Z2024-06-20T19:47:14Zby Barni, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/11551492">http://dx.doi.org/10.1007/11551492</a><br/>Format: Electronic Resources<br/>Ambient Networks 16th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2005, Barcelona, Spain, October 24-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105202024-06-20T19:47:14Z2024-06-20T19:47:14Zby Schönwälder, Jürgen. editor.<br/><a href="http://dx.doi.org/10.1007/11568285">http://dx.doi.org/10.1007/11568285</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103492024-06-20T19:47:14Z2024-06-20T19:47:14Zby Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:5103602024-06-20T19:47:14Z2024-06-20T19:47:14Zby Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11553939">http://dx.doi.org/10.1007/11553939</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part IVent://SD_ILS/0/SD_ILS:5103632024-06-20T19:47:14Z2024-06-20T19:47:14Zby Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11554028">http://dx.doi.org/10.1007/11554028</a><br/>Format: Electronic Resources<br/>Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103642024-06-20T19:47:14Z2024-06-20T19:47:14Zby Gorodetsky, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format: Electronic Resources<br/>Trust Management Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104032024-06-20T19:47:14Z2024-06-20T19:47:14Zby Herrmann, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/b136639">http://dx.doi.org/10.1007/b136639</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5097532024-06-20T19:47:14Z2024-06-20T19:47:14Zby Kilian, Joe. editor.<br/><a href="http://dx.doi.org/10.1007/b106171">http://dx.doi.org/10.1007/b106171</a><br/>Format: Electronic Resources<br/>Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5097572024-06-20T19:47:14Z2024-06-20T19:47:14Zby Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format: Electronic Resources<br/>Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papersent://SD_ILS/0/SD_ILS:5102192024-06-20T19:47:14Z2024-06-20T19:47:14Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format: Electronic Resources<br/>Web and Communication Technologies and Internet-Related Social Issues - HSI 2005 3rd International Conference on Human.Society@Internet, Tokyo, Japan, July 27-29, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101922024-06-20T19:47:14Z2024-06-20T19:47:14Zby Shimojo, Shinji. editor.<br/><a href="http://dx.doi.org/10.1007/11527725">http://dx.doi.org/10.1007/11527725</a><br/>Format: Electronic Resources<br/>Security in Pervasive Computing Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103702024-06-20T19:47:14Z2024-06-20T19:47:14Zby Hutter, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/b135497">http://dx.doi.org/10.1007/b135497</a><br/>Format: Electronic Resources<br/>Product Focused Software Process Improvement 6th International Conference, PROFES 2005, Oulu, Finland, June 13-15, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101012024-06-20T19:47:14Z2024-06-20T19:47:14Zby Bomarius, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/b137178">http://dx.doi.org/10.1007/b137178</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101032024-06-20T19:47:14Z2024-06-20T19:47:14Zby Julisch, Klaus. editor.<br/><a href="http://dx.doi.org/10.1007/b137798">http://dx.doi.org/10.1007/b137798</a><br/>Format: Electronic Resources<br/>Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103022024-06-20T19:47:14Z2024-06-20T19:47:14Zby Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format: Electronic Resources<br/>Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5097702024-06-20T19:47:14Z2024-06-20T19:47:14Zby Blundo, Carlo. editor.<br/><a href="http://dx.doi.org/10.1007/b105083">http://dx.doi.org/10.1007/b105083</a><br/>Format: Electronic Resources<br/>Information Hiding 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5096712024-06-20T19:47:14Z2024-06-20T19:47:14Zby Fridrich, Jessica. editor.<br/><a href="http://dx.doi.org/10.1007/b104759">http://dx.doi.org/10.1007/b104759</a><br/>Format: Electronic Resources<br/>Information Hiding 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5099642024-06-20T19:47:14Z2024-06-20T19:47:14Zby Barni, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/11558859">http://dx.doi.org/10.1007/11558859</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2005 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5102532024-06-20T19:47:14Z2024-06-20T19:47:14Zby Shoup, Victor. editor.<br/><a href="http://dx.doi.org/10.1007/11535218">http://dx.doi.org/10.1007/11535218</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 – 21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103482024-06-20T19:47:14Z2024-06-20T19:47:14Zby Dittmann, Jana. editor.<br/><a href="http://dx.doi.org/10.1007/11552055">http://dx.doi.org/10.1007/11552055</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103512024-06-20T19:47:14Z2024-06-20T19:47:14Zby Vimercati, Sabrina de Capitani. editor.<br/><a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part Ient://SD_ILS/0/SD_ILS:5103532024-06-20T19:47:14Z2024-06-20T19:47:14Zby Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11552413">http://dx.doi.org/10.1007/11552413</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5103562024-06-20T19:47:14Z2024-06-20T19:47:14Zby Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11552451">http://dx.doi.org/10.1007/11552451</a><br/>Format: Electronic Resources<br/>Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104592024-06-20T19:47:14Z2024-06-20T19:47:14Zby Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format: Electronic Resources<br/>