Search Results for - Narrowed by: 2005 - Computers and Society. - Management of Computing and Information Systems. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026qf$003dSUBJECT$002509Subject$002509Computers$002band$002bSociety.$002509Computers$002band$002bSociety.$0026qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026ps$003d300? 2024-06-20T19:47:14Z Perspectives and Policies on ICT in Society An IFIP TC9 (Computers and Society) Handbook ent://SD_ILS/0/SD_ILS:504416 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Berleur, Jacques. editor.<br/><a href="http://dx.doi.org/10.1007/b135654">http://dx.doi.org/10.1007/b135654</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 &ndash; March 3, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:510132 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Patrick, Andrew S. editor.<br/><a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 4th International Conference, EGOV 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510163 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/11545156">http://dx.doi.org/10.1007/11545156</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy, and Security in Digital Business Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510186 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/11537878">http://dx.doi.org/10.1007/11537878</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510424 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Kantor, Paul. editor.<br/><a href="http://dx.doi.org/10.1007/b136511">http://dx.doi.org/10.1007/b136511</a><br/>Format:&#160;Electronic Resources<br/> Software Product Lines 9th International Conference, SPLC 2005, Rennes, France, September 26-29, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510425 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Obbink, Henk. editor.<br/><a href="http://dx.doi.org/10.1007/11554844">http://dx.doi.org/10.1007/11554844</a><br/>Format:&#160;Electronic Resources<br/> Advances in Biometrics International Conference, ICB 2006, Hong Kong, China, January 5-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510093 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Zhang, David. editor.<br/><a href="http://dx.doi.org/10.1007/11608288">http://dx.doi.org/10.1007/11608288</a><br/>Format:&#160;Electronic Resources<br/> Audio- and Video-Based Biometric Person Authentication 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510099 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Kanade, Takeo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-31638-1">http://dx.doi.org/10.1007/978-3-540-31638-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:510331 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Martin, David. editor.<br/><a href="http://dx.doi.org/10.1007/b136164">http://dx.doi.org/10.1007/b136164</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510648 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510650 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Feng, Dengguo. editor.<br/><a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format:&#160;Electronic Resources<br/> Software Process Improvement 12th European Conference, EuroSPI 2005, Budapest, Hungary, November 9-11, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510547 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Richardson, Ita. editor.<br/><a href="http://dx.doi.org/10.1007/11586012">http://dx.doi.org/10.1007/11586012</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510572 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Desmedt, Yvo G. editor.<br/><a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management 3rd International Conference, BPM 2005, Nancy, France, September 5-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510301 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Aalst, Wil M. P. editor.<br/><a href="http://dx.doi.org/10.1007/11538394">http://dx.doi.org/10.1007/11538394</a><br/>Format:&#160;Electronic Resources<br/> Extreme Programming and Agile Processes in Software Engineering 6th International Conference, XP 2005, Sheffield, UK, June 18-23, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509969 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Baumeister, Hubert. editor.<br/><a href="http://dx.doi.org/10.1007/b137278">http://dx.doi.org/10.1007/b137278</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510063 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Chadwick, David. editor.<br/><a href="http://dx.doi.org/10.1007/11533733">http://dx.doi.org/10.1007/11533733</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking Third International Workshop, IWDW 2004, Seoul, South Korea, October 30 - November 1, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510189 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Cox, Ingemar J. editor.<br/><a href="http://dx.doi.org/10.1007/b106346">http://dx.doi.org/10.1007/b106346</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510415 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Barni, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/11551492">http://dx.doi.org/10.1007/11551492</a><br/>Format:&#160;Electronic Resources<br/> Ambient Networks 16th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2005, Barcelona, Spain, October 24-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510520 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Sch&ouml;nw&auml;lder, J&uuml;rgen. editor.<br/><a href="http://dx.doi.org/10.1007/11568285">http://dx.doi.org/10.1007/11568285</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510349 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III ent://SD_ILS/0/SD_ILS:510360 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11553939">http://dx.doi.org/10.1007/11553939</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:510363 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11554028">http://dx.doi.org/10.1007/11554028</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510364 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Gorodetsky, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format:&#160;Electronic Resources<br/> Trust Management Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510403 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Herrmann, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/b136639">http://dx.doi.org/10.1007/b136639</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509753 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Kilian, Joe. editor.<br/><a href="http://dx.doi.org/10.1007/b106171">http://dx.doi.org/10.1007/b106171</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509757 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510219 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format:&#160;Electronic Resources<br/> Web and Communication Technologies and Internet-Related Social Issues - HSI 2005 3rd International Conference on Human.Society@Internet, Tokyo, Japan, July 27-29, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510192 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Shimojo, Shinji. editor.<br/><a href="http://dx.doi.org/10.1007/11527725">http://dx.doi.org/10.1007/11527725</a><br/>Format:&#160;Electronic Resources<br/> Security in Pervasive Computing Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510370 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Hutter, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/b135497">http://dx.doi.org/10.1007/b135497</a><br/>Format:&#160;Electronic Resources<br/> Product Focused Software Process Improvement 6th International Conference, PROFES 2005, Oulu, Finland, June 13-15, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510101 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Bomarius, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/b137178">http://dx.doi.org/10.1007/b137178</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510103 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Julisch, Klaus. editor.<br/><a href="http://dx.doi.org/10.1007/b137798">http://dx.doi.org/10.1007/b137798</a><br/>Format:&#160;Electronic Resources<br/> Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510302 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format:&#160;Electronic Resources<br/> Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509770 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Blundo, Carlo. editor.<br/><a href="http://dx.doi.org/10.1007/b105083">http://dx.doi.org/10.1007/b105083</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509671 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Fridrich, Jessica. editor.<br/><a href="http://dx.doi.org/10.1007/b104759">http://dx.doi.org/10.1007/b104759</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:509964 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Barni, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/11558859">http://dx.doi.org/10.1007/11558859</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2005 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510253 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Shoup, Victor. editor.<br/><a href="http://dx.doi.org/10.1007/11535218">http://dx.doi.org/10.1007/11535218</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 &ndash; 21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510348 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Dittmann, Jana. editor.<br/><a href="http://dx.doi.org/10.1007/11552055">http://dx.doi.org/10.1007/11552055</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510351 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Vimercati, Sabrina de Capitani. editor.<br/><a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part I ent://SD_ILS/0/SD_ILS:510353 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11552413">http://dx.doi.org/10.1007/11552413</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part II ent://SD_ILS/0/SD_ILS:510356 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11552451">http://dx.doi.org/10.1007/11552451</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510459 2024-06-20T19:47:14Z 2024-06-20T19:47:14Z by&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format:&#160;Electronic Resources<br/>