Search Results for - Narrowed by: 2007 - Management of Computing and Information Systems. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092007$0025092007$0026qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026ps$003d300? 2024-05-20T16:37:28Z Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512248 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Vadhan, Salil P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers ent://SD_ILS/0/SD_ILS:512922 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512761 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 9th International Symposium, SSS 2007 Paris, France, November 14-16, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512961 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Masuzawa, Toshimitsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76627-8">http://dx.doi.org/10.1007/978-3-540-76627-8</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence and Security International Conference, CIS 2006. Guangzhou, China, November 3-6, 2006. Revised Selected Papers ent://SD_ILS/0/SD_ILS:512782 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Wang, Yuping. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74377-4">http://dx.doi.org/10.1007/978-3-540-74377-4</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512784 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512974 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Nam, Kil-Hyun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512871 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Saglietti, Francesca. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512986 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Kurosawa, Kaoru. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513004 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512529 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512362 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71549-8">http://dx.doi.org/10.1007/978-3-540-71549-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512460 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Sauveron, Damien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format:&#160;Electronic Resources<br/> Model Driven Architecture- Foundations and Applications Third European Conference, ECMDA-FA 2007, Haifa, Israel, June 11-15, 2007, Proccedings ent://SD_ILS/0/SD_ILS:512553 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Akehurst, David H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72901-3">http://dx.doi.org/10.1007/978-3-540-72901-3</a><br/>Format:&#160;Electronic Resources<br/> Requirements Engineering: Foundation for Software Quality 13th International Working Conference, REFSQ 2007, Trondheim, Norway, June 11-12, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512581 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Sawyer, Pete. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73031-6">http://dx.doi.org/10.1007/978-3-540-73031-6</a><br/>Format:&#160;Electronic Resources<br/> Rapid Integration of Software Engineering Techniques Third International Workshop, RISE 2006, Geneva, Switzerland, September 13-15, 2006. Revised Selected Papers ent://SD_ILS/0/SD_ILS:512402 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Guelfi, Nicolas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71876-5">http://dx.doi.org/10.1007/978-3-540-71876-5</a><br/>Format:&#160;Electronic Resources<br/> Testing of Software and Communicating Systems 19th IFIP TC6/WG6.1 International Conference, TestCom 2007, 7th International Workshop, FATES 2007, Tallinn, Estonia, June 26-29, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512589 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Petrenko, Alexandre. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73066-8">http://dx.doi.org/10.1007/978-3-540-73066-8</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security II ent://SD_ILS/0/SD_ILS:512594 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73092-7">http://dx.doi.org/10.1007/978-3-540-73092-7</a><br/>Format:&#160;Electronic Resources<br/> Agile Processes in Software Engineering and Extreme Programming 8th International Conference, XP 2007, Como, Italy, June 18-22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512597 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Concas, Giulio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73101-6">http://dx.doi.org/10.1007/978-3-540-73101-6</a><br/>Format:&#160;Electronic Resources<br/> SDL 2007: Design for Dependable Systems 13th International SDL Forum Paris, France, September 18-21, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512866 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Gaudin, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74984-4">http://dx.doi.org/10.1007/978-3-540-74984-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Biometrics International Conference, ICB 2007, Seoul, Korea, August 27-29, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512803 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Lee, Seong-Whan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74549-5">http://dx.doi.org/10.1007/978-3-540-74549-5</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management 5th International Conference, BPM 2007, Brisbane, Australia, September 24-28, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512880 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Alonso, Gustavo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75183-0">http://dx.doi.org/10.1007/978-3-540-75183-0</a><br/>Format:&#160;Electronic Resources<br/> Preserving Digital Information ent://SD_ILS/0/SD_ILS:511579 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Gladney, Henry M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-37887-7">http://dx.doi.org/10.1007/978-3-540-37887-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512440 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format:&#160;Electronic Resources<br/> Service Availability 4th International Service Availability Symposium, ISAS 2007, Durham, NH, USA, May 21-22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512528 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72736-1">http://dx.doi.org/10.1007/978-3-540-72736-1</a><br/>Format:&#160;Electronic Resources<br/> Software Process Dynamics and Agility International Conference on Software Process, ICSP 2007, Minneapolis, MN, USA, May 19-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512473 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Wang, Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72426-1">http://dx.doi.org/10.1007/978-3-540-72426-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512276 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Lee, Jae Kwang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format:&#160;Electronic Resources<br/> Anti-Spam Measures Analysis and Design ent://SD_ILS/0/SD_ILS:512390 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Schryen, Guido. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71750-8">http://dx.doi.org/10.1007/978-3-540-71750-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512675 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format:&#160;Electronic Resources<br/> Product-Focused Software Process Improvement 8th International Conference, PROFES 2007, Riga, Latvia, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512676 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;M&uuml;nch, J&uuml;rgen. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73460-4">http://dx.doi.org/10.1007/978-3-540-73460-4</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513017 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77156-2">http://dx.doi.org/10.1007/978-3-540-77156-2</a><br/>Format:&#160;Electronic Resources<br/> Software Engineering Approaches for Offshore and Outsourced Development First International Conference, SEAFOOD 2007, Zurich, Switzerland, February 5-6, 2007. Revised Papers ent://SD_ILS/0/SD_ILS:512920 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Meyer, Bertrand. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75542-5">http://dx.doi.org/10.1007/978-3-540-75542-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 &mdash; 26, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512846 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Biskup, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513032 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Adams, Carlisle. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format:&#160;Electronic Resources<br/> Runtime Verification 7th International Workshop, RV 2007, Vancover, Canada, March 13, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513036 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Sokolsky, Oleg. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77395-5">http://dx.doi.org/10.1007/978-3-540-77395-5</a><br/>Format:&#160;Electronic Resources<br/> E-Voting and Identity First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513040 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Alkassar, Ammar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77493-8">http://dx.doi.org/10.1007/978-3-540-77493-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513042 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Okada, Mitsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77505-8">http://dx.doi.org/10.1007/978-3-540-77505-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513043 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Kim, Sehun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77535-5">http://dx.doi.org/10.1007/978-3-540-77535-5</a><br/>Format:&#160;Electronic Resources<br/> Sustainable Internet Third Asian Internet Engineering Conference, AINTEC 2007, Phuket, Thailand, November 27-29, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512976 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Fdida, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76809-8">http://dx.doi.org/10.1007/978-3-540-76809-8</a><br/>Format:&#160;Electronic Resources<br/> Early Aspects: Current Challenges and Future Directions 10th International Workshop, Vancouver, Canada, March 13, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512977 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Moreira, Ana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76811-1">http://dx.doi.org/10.1007/978-3-540-76811-1</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Aspect-Oriented Software Development III ent://SD_ILS/0/SD_ILS:512878 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Rashid, Awais. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75162-5">http://dx.doi.org/10.1007/978-3-540-75162-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer Science &ndash; ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512989 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Cervesato, Iliano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512991 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Bao, Feng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76969-9">http://dx.doi.org/10.1007/978-3-540-76969-9</a><br/>Format:&#160;Electronic Resources<br/> Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512998 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Zhang, Hongke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2007 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512999 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Srinathan, K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77026-8">http://dx.doi.org/10.1007/978-3-540-77026-8</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Aspect-Oriented Software Development IV ent://SD_ILS/0/SD_ILS:513002 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Rashid, Awais. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77042-8">http://dx.doi.org/10.1007/978-3-540-77042-8</a><br/>Format:&#160;Electronic Resources<br/> Model Driven Engineering Languages and Systems 10th International Conference, MoDELS 2007, Nashville, USA, September 30 - October 5, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512884 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Engels, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75209-7">http://dx.doi.org/10.1007/978-3-540-75209-7</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513007 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;McDaniel, Patrick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 6th International Conference, EGOV 2007, Regensburg, Germany, September 3-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512788 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74444-3">http://dx.doi.org/10.1007/978-3-540-74444-3</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:512793 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Biham, Eli. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format:&#160;Electronic Resources<br/> Models in Software Engineering Workshops and Symposia at MoDELS 2006, Genoa, Italy, October 1-6, 2006, Reports and Revised Selected Papers ent://SD_ILS/0/SD_ILS:512164 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;K&uuml;hne, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69489-2">http://dx.doi.org/10.1007/978-3-540-69489-2</a><br/>Format:&#160;Electronic Resources<br/> Software Product Lines in Action The Best Industrial Practice in Product Line Engineering ent://SD_ILS/0/SD_ILS:512341 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Linden, Frank. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71437-8">http://dx.doi.org/10.1007/978-3-540-71437-8</a><br/>Format:&#160;Electronic Resources<br/> Active Networks IFIP TC6 6th International Working Conference, IWAN 2004, Lawrence, KS, USA, October 27-29, 2004. Revised Papers ent://SD_ILS/0/SD_ILS:512352 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Minden, Gary J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71500-9">http://dx.doi.org/10.1007/978-3-540-71500-9</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics: Biosurveillance Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May 22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512504 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Zeng, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72608-1">http://dx.doi.org/10.1007/978-3-540-72608-1</a><br/>Format:&#160;Electronic Resources<br/> Reliable Software Technologies &ndash; Ada Europe 2007 12th Ada-Europe International Conference on Reliable Software Technologies, Geneva, Switzerland, June 25-29, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512621 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Abdennadher, Nabil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73230-3">http://dx.doi.org/10.1007/978-3-540-73230-3</a><br/>Format:&#160;Electronic Resources<br/> Software Measurement Establish &mdash; Extract &mdash; Evaluate &mdash; Execute ent://SD_ILS/0/SD_ILS:512378 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Ebert, Christof. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71649-5">http://dx.doi.org/10.1007/978-3-540-71649-5</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography &ndash; PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512381 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Okamoto, Tatsuaki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format:&#160;Electronic Resources<br/> Online Communities and Social Computing Second International Conference, OCSC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512623 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Schuler, Douglas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73257-0">http://dx.doi.org/10.1007/978-3-540-73257-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512626 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Format:&#160;Electronic Resources<br/> Inter-Domain Management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512572 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Bandara, Arosha K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72986-0">http://dx.doi.org/10.1007/978-3-540-72986-0</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design IV FOSAD 2006/2007 Tutorial Lectures ent://SD_ILS/0/SD_ILS:512837 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74810-6">http://dx.doi.org/10.1007/978-3-540-74810-6</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part I ent://SD_ILS/0/SD_ILS:512840 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Apolloni, Bruno. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74819-9">http://dx.doi.org/10.1007/978-3-540-74819-9</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part II ent://SD_ILS/0/SD_ILS:512843 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Apolloni, Bruno. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74827-4">http://dx.doi.org/10.1007/978-3-540-74827-4</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part III ent://SD_ILS/0/SD_ILS:512844 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Apolloni, Bruno. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74829-8">http://dx.doi.org/10.1007/978-3-540-74829-8</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512888 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">http://dx.doi.org/10.1007/978-3-540-75227-1</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512889 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75248-6">http://dx.doi.org/10.1007/978-3-540-75248-6</a><br/>Format:&#160;Electronic Resources<br/> Spatial Database Systems Design, Implementation and Project Management ent://SD_ILS/0/SD_ILS:507259 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Yeung, Albert K. W. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-5392-4">http://dx.doi.org/10.1007/1-4020-5392-4</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Interoperability New Challenges and Approaches ent://SD_ILS/0/SD_ILS:508649 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Doumeingts, Guy. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-714-5">http://dx.doi.org/10.1007/978-1-84628-714-5</a><br/>Format:&#160;Electronic Resources<br/> Network-Centric Service-Oriented Enterprise ent://SD_ILS/0/SD_ILS:507651 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Chang, William Y. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4020-6456-2">http://dx.doi.org/10.1007/978-1-4020-6456-2</a><br/>Format:&#160;Electronic Resources<br/> Organizational Dynamics of Technology-Based Innovation: Diversifying the Research Agenda IFIP TC 8 WG 8.6 International Working Conference, June 14&ndash;16, Manchester, UK ent://SD_ILS/0/SD_ILS:506005 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;McMaster, Tom. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72804-9">http://dx.doi.org/10.1007/978-0-387-72804-9</a><br/>Format:&#160;Electronic Resources<br/> Software Process Improvement 14th European Conference, EuroSPI 2007, Potsdam, Germany, September 26-28, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512902 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Abrahamsson, Pekka. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75381-0">http://dx.doi.org/10.1007/978-3-540-75381-0</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Interoperability II New Challenges and Approaches ent://SD_ILS/0/SD_ILS:508702 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Gon&ccedil;alves, Ricardo J. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-858-6">http://dx.doi.org/10.1007/978-1-84628-858-6</a><br/>Format:&#160;Electronic Resources<br/> Grid Computing Security ent://SD_ILS/0/SD_ILS:511672 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Chakrabarti, Anirban. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Action Research An Applied View of Emerging Concepts and Methods ent://SD_ILS/0/SD_ILS:505403 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Kock, Ned. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36060-7">http://dx.doi.org/10.1007/978-0-387-36060-7</a><br/>Format:&#160;Electronic Resources<br/> Digital Decision Making Back to the Future ent://SD_ILS/0/SD_ILS:508632 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Corrigan, Ray. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-673-5">http://dx.doi.org/10.1007/978-1-84628-673-5</a><br/>Format:&#160;Electronic Resources<br/> Metagraphs and Their Applications ent://SD_ILS/0/SD_ILS:505472 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Basu, Amit. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-37234-1">http://dx.doi.org/10.1007/978-0-387-37234-1</a><br/>Format:&#160;Electronic Resources<br/> EC2ND 2006 Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Faculty of Advanced Technology, University of Glamorgan, Wales, UK ent://SD_ILS/0/SD_ILS:508664 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Blyth, Andrew. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-750-3">http://dx.doi.org/10.1007/978-1-84628-750-3</a><br/>Format:&#160;Electronic Resources<br/> Guerrilla Capacity Planning A Tactical Approach to Planning for Highly Scalable Applications and Services ent://SD_ILS/0/SD_ILS:509840 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Gunther, Neil J. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-31010-5">http://dx.doi.org/10.1007/978-3-540-31010-5</a><br/>Format:&#160;Electronic Resources<br/> Business Information Systems 10th International Conference, BIS 2007, Poznan, Poland, April 25-27, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512429 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Abramowicz, Witold. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72035-5">http://dx.doi.org/10.1007/978-3-540-72035-5</a><br/>Format:&#160;Electronic Resources<br/> Successfully Implementing Microsoft Dynamics&trade; by Using the Regatta&reg; Approach for Microsoft Dynamics&trade; ent://SD_ILS/0/SD_ILS:512370 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Koop, Reinder. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71593-1">http://dx.doi.org/10.1007/978-3-540-71593-1</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512660 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73408-6">http://dx.doi.org/10.1007/978-3-540-73408-6</a><br/>Format:&#160;Electronic Resources<br/> Object-Oriented Technology. ECOOP 2006 Workshop Reader ECOOP 2006 Workshops, Nantes, France, July 3-7, 2006, Final Reports ent://SD_ILS/0/SD_ILS:512391 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;S&uuml;dholt, Mario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71774-4">http://dx.doi.org/10.1007/978-3-540-71774-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512492 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Naor, Moni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72540-4">http://dx.doi.org/10.1007/978-3-540-72540-4</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems - CHES 2007 9th International Workshop, Vienna, Austria, September 10-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512825 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Paillier, Pascal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74735-2">http://dx.doi.org/10.1007/978-3-540-74735-2</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security XXI 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512687 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Barker, Steve. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73538-0">http://dx.doi.org/10.1007/978-3-540-73538-0</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512690 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Xiao, Bin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73547-2">http://dx.doi.org/10.1007/978-3-540-73547-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512927 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Miyaji, Atsuko. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format:&#160;Electronic Resources<br/> Software Technologies for Embedded and Ubiquitous Systems 5th IFIP WG 10.2 International Workshop, SEUS 2007, Santorini Island, Greece, May 2007. Revised Papers ent://SD_ILS/0/SD_ILS:512928 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Obermaisser, Roman. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75664-4">http://dx.doi.org/10.1007/978-3-540-75664-4</a><br/>Format:&#160;Electronic Resources<br/> Business Intelligence for the Real-Time Enterprises First International Workshop, BIRTE 2006, Seoul, Korea, September 11, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512739 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Bussler, Christoph. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73950-0">http://dx.doi.org/10.1007/978-3-540-73950-0</a><br/>Format:&#160;Electronic Resources<br/> ECOOP 2007 &ndash; Object-Oriented Programming 21st European Conference, Berlin, Germany, July 30 - August 3, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512699 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Ernst, Erik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73589-2">http://dx.doi.org/10.1007/978-3-540-73589-2</a><br/>Format:&#160;Electronic Resources<br/> Managing Virtualization of Networks and Services 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San Jos&eacute;, CA, USA, October 29-31, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512933 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Clemm, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75694-1">http://dx.doi.org/10.1007/978-3-540-75694-1</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512703 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;H&auml;mmerli, Bernhard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Format:&#160;Electronic Resources<br/> IP Operations and Management 7th IEEE International Workshop, IPOM 2007 San Jos&eacute;, USA, October 31 - November 2, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512942 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Medhi, Deep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75853-2">http://dx.doi.org/10.1007/978-3-540-75853-2</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers ent://SD_ILS/0/SD_ILS:513033 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Hybrid Information Technology First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513034 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Szczuka, Marcin S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77368-9">http://dx.doi.org/10.1007/978-3-540-77368-9</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513035 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Furon, Teddy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77370-2">http://dx.doi.org/10.1007/978-3-540-77370-2</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers ent://SD_ILS/0/SD_ILS:512756 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Camenisch, Jan L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Intrusion Detection 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512777 2024-05-20T16:37:28Z 2024-05-20T16:37:28Z by&#160;Kruegel, Christopher. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74320-0">http://dx.doi.org/10.1007/978-3-540-74320-0</a><br/>Format:&#160;Electronic Resources<br/>