Search Results for - Narrowed by: 2016 - Information Systems. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092016$0025092016$0026qf$003dSUBJECT$002509Subject$002509Information$002bSystems.$002509Information$002bSystems.$0026ps$003d300? 2024-05-26T16:11:49Z Cloud Computing and Services Science 5th International Conference, CLOSER 2015, Lisbon, Portugal, May 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084554 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Helfert, Markus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29582-4">https://doi.org/10.1007/978-3-319-29582-4</a><br/>Format:&#160;Electronic Resources<br/> Co-production in the Public Sector Experiences and Challenges ent://SD_ILS/0/SD_ILS:2084694 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Fugini, Mariagrazia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30558-5">https://doi.org/10.1007/978-3-319-30558-5</a><br/>Format:&#160;Electronic Resources<br/> Shared Services and Outsourcing: A Contemporary Outlook 10th Global Sourcing Workshop 2016, Val d'Is&egrave;re, France, February 16-19, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084846 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Kotlarsky, Julia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47009-2">https://doi.org/10.1007/978-3-319-47009-2</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:2085246 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48671-0">https://doi.org/10.1007/978-3-319-48671-0</a><br/>Format:&#160;Electronic Resources<br/> Managing Software Process Evolution Traditional, Agile and Beyond &ndash; How to Handle Process Change ent://SD_ILS/0/SD_ILS:2085010 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Kuhrmann, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31545-4">https://doi.org/10.1007/978-3-319-31545-4</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 13th International Conference, DIMVA 2016, San Sebasti&aacute;n, Spain, July 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085015 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Caballero, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40667-1">https://doi.org/10.1007/978-3-319-40667-1</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085089 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Zhu, Quanyan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47413-7">https://doi.org/10.1007/978-3-319-47413-7</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management 14th International Conference, BPM 2016, Rio de Janeiro, Brazil, September 18-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085768 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;La Rosa, Marcello. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45348-4">https://doi.org/10.1007/978-3-319-45348-4</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085928 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46598-2">https://doi.org/10.1007/978-3-319-46598-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085962 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53008-5">https://doi.org/10.1007/978-3-662-53008-5</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085726 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48965-0">https://doi.org/10.1007/978-3-319-48965-0</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086153 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Tryfonas, Theo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39381-0">https://doi.org/10.1007/978-3-319-39381-0</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084839 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format:&#160;Electronic Resources<br/> Software Technologies 10th International Joint Conference, ICSOFT 2015, Colmar, France, July 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084941 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Lorenz, Pascal. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30142-6">https://doi.org/10.1007/978-3-319-30142-6</a><br/>Format:&#160;Electronic Resources<br/> Agile Processes, in Software Engineering, and Extreme Programming 17th International Conference, XP 2016, Edinburgh, UK, May 24-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084602 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Sharp, Helen. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33515-5">https://doi.org/10.1007/978-3-319-33515-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085230 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40367-0">https://doi.org/10.1007/978-3-319-40367-0</a><br/>Format:&#160;Electronic Resources<br/> Social, Cultural, and Behavioral Modeling 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28 - July 1, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085231 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Xu, Kevin S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39931-7">https://doi.org/10.1007/978-3-319-39931-7</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085428 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Monrose, Fabian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45719-2">https://doi.org/10.1007/978-3-319-45719-2</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085747 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Homma, Naofumi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31271-2">https://doi.org/10.1007/978-3-319-31271-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085585 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49896-5">https://doi.org/10.1007/978-3-662-49896-5</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085406 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Lambrinoudakis, Costas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31811-0">https://doi.org/10.1007/978-3-319-31811-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085800 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53890-6">https://doi.org/10.1007/978-3-662-53890-6</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 &ndash; September 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085802 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Zikas, Vassilis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44618-9">https://doi.org/10.1007/978-3-319-44618-9</a><br/>Format:&#160;Electronic Resources<br/> Provenance and Annotation of Data and Processes 6th International Provenance and Annotation Workshop, IPAW 2016, McLean, VA, USA, June 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085996 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Mattoso, Marta. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40593-3">https://doi.org/10.1007/978-3-319-40593-3</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing 14th International Conference, ICSOC 2016, Banff, AB, Canada, October 10-13, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086003 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Sheng, Quan Z. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46295-0">https://doi.org/10.1007/978-3-319-46295-0</a><br/>Format:&#160;Electronic Resources<br/> Evaluation of Novel Approaches to Software Engineering 10th International Conference, ENASE 2015, Barcelona, Spain, April 29&ndash;30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084414 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Maciaszek, Leszek A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30243-0">https://doi.org/10.1007/978-3-319-30243-0</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084254 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format:&#160;Electronic Resources<br/> Software Quality. The Future of Systems- and Software Development 8th International Conference, SWQD 2016, Vienna, Austria, January 18-21, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084438 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Winkler, Dietmar. editor.<br/><a href="https://doi.org/10.1007/978-3-319-27033-3">https://doi.org/10.1007/978-3-319-27033-3</a><br/>Format:&#160;Electronic Resources<br/> Pragmatic Evaluation of Software Architectures ent://SD_ILS/0/SD_ILS:2084761 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Knodel, Jens. author.<br/><a href="https://doi.org/10.1007/978-3-319-34177-4">https://doi.org/10.1007/978-3-319-34177-4</a><br/>Format:&#160;Electronic Resources<br/> Software Process Improvement and Capability Determination 16th International Conference, SPICE 2016, Dublin, Ireland, June 9-10, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084674 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Clarke, Paul M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-38980-6">https://doi.org/10.1007/978-3-319-38980-6</a><br/>Format:&#160;Electronic Resources<br/> Collaboration in a Hyperconnected World 17th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2016, Porto, Portugal, October 3-5, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084842 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Afsarmanesh, Hamideh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45390-3">https://doi.org/10.1007/978-3-319-45390-3</a><br/>Format:&#160;Electronic Resources<br/> Beyond Interpretivism? New Encounters with Technology and Organization IFIP WG 8.2 Working Conference on Information Systems and Organizations, IS&amp;O 2016, Dublin, Ireland, December 9-10, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084843 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Introna, Lucas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49733-4">https://doi.org/10.1007/978-3-319-49733-4</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084716 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Aspinall, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41763-9">https://doi.org/10.1007/978-3-319-41763-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085735 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49890-3">https://doi.org/10.1007/978-3-662-49890-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III ent://SD_ILS/0/SD_ILS:2085736 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53015-3">https://doi.org/10.1007/978-3-662-53015-3</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085737 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49387-8">https://doi.org/10.1007/978-3-662-49387-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Network Science 12th International Conference and School, NetSci-X 2016, Wroclaw, Poland, January 11-13, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085549 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Wierzbicki, Adam. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28361-6">https://doi.org/10.1007/978-3-319-28361-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26&ndash;27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085465 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45931-8">https://doi.org/10.1007/978-3-319-45931-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085676 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Modularity and Composition I ent://SD_ILS/0/SD_ILS:2085831 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Chiba, Shigeru. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46969-0">https://doi.org/10.1007/978-3-319-46969-0</a><br/>Format:&#160;Electronic Resources<br/> Wireless Algorithms, Systems, and Applications 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085840 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Yang, Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-42836-9">https://doi.org/10.1007/978-3-319-42836-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085685 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40253-6">https://doi.org/10.1007/978-3-319-40253-6</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 &ndash; December 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085698 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Lam, Kwok-Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50011-9">https://doi.org/10.1007/978-3-319-50011-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20&ndash;22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085953 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Kim, Ho-won. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31875-2">https://doi.org/10.1007/978-3-319-31875-2</a><br/>Format:&#160;Electronic Resources<br/> FM 2016: Formal Methods 21st International Symposium, Limassol, Cyprus, November 9-11, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085958 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Fitzgerald, John. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48989-6">https://doi.org/10.1007/978-3-319-48989-6</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085980 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Katsikas, Sokratis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44341-6">https://doi.org/10.1007/978-3-319-44341-6</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086143 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086144 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Bao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49151-6">https://doi.org/10.1007/978-3-319-49151-6</a><br/>Format:&#160;Electronic Resources<br/> The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday ent://SD_ILS/0/SD_ILS:2086154 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Ryan, Peter Y. A. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49301-4">https://doi.org/10.1007/978-3-662-49301-4</a><br/>Format:&#160;Electronic Resources<br/> Formal Methods: Foundations and Applications 18th Brazilian Symposium, SBMF 2015, Belo Horizonte, Brazil, September 21-22, 2015, Proceedings ent://SD_ILS/0/SD_ILS:2086155 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Corn&eacute;lio, M&aacute;rcio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29473-5">https://doi.org/10.1007/978-3-319-29473-5</a><br/>Format:&#160;Electronic Resources<br/> Mobility Management Principle, Technology and Applications ent://SD_ILS/0/SD_ILS:2086565 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Chen, Shanzhi. author.<br/><a href="https://doi.org/10.1007/978-3-662-52726-9">https://doi.org/10.1007/978-3-662-52726-9</a><br/>Format:&#160;Electronic Resources<br/> Software Engineering for Resilient Systems 8th International Workshop, SERENE 2016, Gothenburg, Sweden, September 5-6, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085898 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Crnkovic, Ivica. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45892-2">https://doi.org/10.1007/978-3-319-45892-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086059 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53887-6">https://doi.org/10.1007/978-3-662-53887-6</a><br/>Format:&#160;Electronic Resources<br/> Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21&ndash;22, 2015 Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086062 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;B&eacute;cue, Adrien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40385-4">https://doi.org/10.1007/978-3-319-40385-4</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2086063 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format:&#160;Electronic Resources<br/> Logistics and Supply Chain Innovation Bridging the Gap between Theory and Practice ent://SD_ILS/0/SD_ILS:2086692 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Zijm, Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-22288-2">https://doi.org/10.1007/978-3-319-22288-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086099 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53018-4">https://doi.org/10.1007/978-3-662-53018-4</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Technology ent://SD_ILS/0/SD_ILS:2084089 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Castillo, Francisco. author.<br/><a href="https://doi.org/10.1007/978-3-319-38891-5">https://doi.org/10.1007/978-3-319-38891-5</a><br/>Format:&#160;Electronic Resources<br/> Tamed Agility Pragmatic Contracting and Collaboration in Agile Software Projects ent://SD_ILS/0/SD_ILS:2084768 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Book, Matthias. author.<br/><a href="https://doi.org/10.1007/978-3-319-41478-2">https://doi.org/10.1007/978-3-319-41478-2</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084777 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Haltinner, Kristin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28313-5">https://doi.org/10.1007/978-3-319-28313-5</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085238 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Franz, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45572-3">https://doi.org/10.1007/978-3-319-45572-3</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085256 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Gierlichs, Benedikt. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53140-2">https://doi.org/10.1007/978-3-662-53140-2</a><br/>Format:&#160;Electronic Resources<br/> Software Architecture 10th European Conference, ECSA 2016, Copenhagen, Denmark, November 28 -- December 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085260 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Tekinerdogan, Bedir. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48992-6">https://doi.org/10.1007/978-3-319-48992-6</a><br/>Format:&#160;Electronic Resources<br/> Product-Focused Software Process Improvement 17th International Conference, PROFES 2016, Trondheim, Norway, November 22-24, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085262 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Abrahamsson, Pekka. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49094-6">https://doi.org/10.1007/978-3-319-49094-6</a><br/>Format:&#160;Electronic Resources<br/> Advanced Multimedia and Ubiquitous Engineering FutureTech &amp; MUE ent://SD_ILS/0/SD_ILS:2084036 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-981-10-1536-6">https://doi.org/10.1007/978-981-10-1536-6</a><br/>Format:&#160;Electronic Resources<br/> Modeling with UML Language, Concepts, Methods ent://SD_ILS/0/SD_ILS:2084741 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Rumpe, Bernhard. author.<br/><a href="https://doi.org/10.1007/978-3-319-33933-7">https://doi.org/10.1007/978-3-319-33933-7</a><br/>Format:&#160;Electronic Resources<br/> Guide to Software Development Designing and Managing the Life Cycle ent://SD_ILS/0/SD_ILS:2084770 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Langer, Arthur M. author.<br/><a href="https://doi.org/10.1007/978-1-4471-6799-0">https://doi.org/10.1007/978-1-4471-6799-0</a><br/>Format:&#160;Electronic Resources<br/> Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084105 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format:&#160;Electronic Resources<br/> Product Lifecycle Management for Digital Transformation of Industries 13th IFIP WG 5.1 International Conference, PLM 2016, Columbia, SC, USA, July 11-13, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084108 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Harik, Ramy. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54660-5">https://doi.org/10.1007/978-3-319-54660-5</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085036 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format:&#160;Electronic Resources<br/> Evaluation of Novel Approaches to Software Engineering 11th International Conference, ENASE 2016, Rome, Italy, April 27&ndash;28, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084367 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Maciaszek, Leszek A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56390-9">https://doi.org/10.1007/978-3-319-56390-9</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Foundations for Mastering Change I ent://SD_ILS/0/SD_ILS:2086117 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Steffen, Bernhard. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46508-1">https://doi.org/10.1007/978-3-319-46508-1</a><br/>Format:&#160;Electronic Resources<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086126 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085439 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format:&#160;Electronic Resources<br/> Innovative Security Solutions for Information Technology and Communications 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085443 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Bica, Ion. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47238-6">https://doi.org/10.1007/978-3-319-47238-6</a><br/>Format:&#160;Electronic Resources<br/> Systems, Software and Services Process Improvement 23rd European Conference, EuroSPI 2016, Graz, Austria, September 14-16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084885 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Kreiner, Christian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44817-6">https://doi.org/10.1007/978-3-319-44817-6</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085732 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29360-8">https://doi.org/10.1007/978-3-319-29360-8</a><br/>Format:&#160;Electronic Resources<br/> Open Source Systems: Integrating Communities 12th IFIP WG 2.13 International Conference, OSS 2016, Gothenburg, Sweden, May 30 - June 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084999 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Crowston, Kevin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39225-7">https://doi.org/10.1007/978-3-319-39225-7</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085016 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Peyrin, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-52993-5">https://doi.org/10.1007/978-3-662-52993-5</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects of Component Software 12th International Conference, FACS 2015, Niter&oacute;i, Brazil, October 14-16, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085786 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Braga, Christiano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28934-2">https://doi.org/10.1007/978-3-319-28934-2</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085709 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Pointcheval, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31517-1">https://doi.org/10.1007/978-3-319-31517-1</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085713 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Standaert, Fran&ccedil;ois-Xavier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43283-0">https://doi.org/10.1007/978-3-319-43283-0</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086006 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Bonakdarpour, Borzoo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49259-9">https://doi.org/10.1007/978-3-319-49259-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085887 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Ogawa, Kazuto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5&ndash;6, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085888 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2086079 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086087 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Livraga, Giovanni. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47072-6">https://doi.org/10.1007/978-3-319-47072-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086095 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Interoperability VII Enterprise Interoperability in the Digitized and Networked Factory of the Future ent://SD_ILS/0/SD_ILS:2087694 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Mertins, Kai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30957-6">https://doi.org/10.1007/978-3-319-30957-6</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government and the Information Systems Perspective 5th International Conference, EGOVIS 2016, Porto, Portugal, September 5-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086208 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Kő, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44159-7">https://doi.org/10.1007/978-3-319-44159-7</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085704 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49384-7">https://doi.org/10.1007/978-3-662-49384-7</a><br/>Format:&#160;Electronic Resources<br/> Web Services, Formal Methods, and Behavioral Types 11th International Workshop, WS-FM 2014, Eindhoven, The Netherlands, September 11-12, 2014, and 12th International Workshop, WS-FM/BEAT 2015, Madrid, Spain, September 4-5, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086078 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Hildebrandt, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33612-1">https://doi.org/10.1007/978-3-319-33612-1</a><br/>Format:&#160;Electronic Resources<br/> Requirements Engineering: Foundation for Software Quality 22nd International Working Conference, REFSQ 2016, Gothenburg, Sweden, March 14-17, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085701 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Daneva, Maya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30282-9">https://doi.org/10.1007/978-3-319-30282-9</a><br/>Format:&#160;Electronic Resources<br/> Formal SQL Tuning for Oracle Databases Practical Efficiency - Efficient Practice ent://SD_ILS/0/SD_ILS:2084365 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Nossov, Leonid. author.<br/><a href="https://doi.org/10.1007/978-3-662-50417-8">https://doi.org/10.1007/978-3-662-50417-8</a><br/>Format:&#160;Electronic Resources<br/> Product Lifecycle Management in the Era of Internet of Things 12th IFIP WG 5.1 International Conference, PLM 2015, Doha, Qatar, October 19-21, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084174 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Bouras, Abdelaziz. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33111-9">https://doi.org/10.1007/978-3-319-33111-9</a><br/>Format:&#160;Electronic Resources<br/> Data Science and Big Data Computing Frameworks and Methodologies ent://SD_ILS/0/SD_ILS:2084874 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31861-5">https://doi.org/10.1007/978-3-319-31861-5</a><br/>Format:&#160;Electronic Resources<br/> Testing Software and Systems 28th IFIP WG 6.1 International Conference, ICTSS 2016, Graz, Austria, October 17-19, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085441 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Wotawa, Franz. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47443-4">https://doi.org/10.1007/978-3-319-47443-4</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21&ndash;22, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085728 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29883-2">https://doi.org/10.1007/978-3-319-29883-2</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085729 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2&ndash;8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085744 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085745 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Karagiannis, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30505-9">https://doi.org/10.1007/978-3-319-30505-9</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented and Cloud Computing 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085082 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Aiello, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44482-6">https://doi.org/10.1007/978-3-319-44482-6</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085086 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format:&#160;Electronic Resources<br/> System Analysis and Modeling. Technology-Specific Aspects of Models 9th International Conference, SAM 2016, Saint-Melo, France, October 3-4, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085087 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Grabowski, Jens. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46613-2">https://doi.org/10.1007/978-3-319-46613-2</a><br/>Format:&#160;Electronic Resources<br/> Multiple Access Communications 9th International Workshop, MACOM 2016, Aalborg, Denmark, November 21-22, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085095 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Madsen, Tatiana K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51376-8">https://doi.org/10.1007/978-3-319-51376-8</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085097 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Rome, Erich. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33331-1">https://doi.org/10.1007/978-3-319-33331-1</a><br/>Format:&#160;Electronic Resources<br/> Model and Data Engineering 6th International Conference, MEDI 2016, Almer&iacute;a, Spain, September 21-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085614 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Bellatreche, Ladjel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45547-1">https://doi.org/10.1007/978-3-319-45547-1</a><br/>Format:&#160;Electronic Resources<br/> Formal Methods: Foundations and Applications 19th Brazilian Symposium, SBMF 2016, Natal, Brazil, November 23-25, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085618 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Ribeiro, Leila. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49815-7">https://doi.org/10.1007/978-3-319-49815-7</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lectures ent://SD_ILS/0/SD_ILS:2085858 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Aldini, Alessandro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format:&#160;Electronic Resources<br/> Mathematical and Engineering Methods in Computer Science 10th International Doctoral Workshop, MEMICS 2015, Telč, Czech Republic, October 23&ndash;25, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085525 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Kofroň, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29817-7">https://doi.org/10.1007/978-3-319-29817-7</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7&ndash;9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:2085526 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format:&#160;Electronic Resources<br/> Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085986 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Badonnel, R&eacute;mi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39814-3">https://doi.org/10.1007/978-3-319-39814-3</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085812 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Chen, Jiageng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46298-1">https://doi.org/10.1007/978-3-319-46298-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086158 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Kwon, Soonhak. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30840-1">https://doi.org/10.1007/978-3-319-30840-1</a><br/>Format:&#160;Electronic Resources<br/> Modelling Foundations and Applications 12th European Conference, ECMFA 2016, Held as Part of STAF 2016, Vienna, Austria, July 6-7, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085820 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Wąsowski, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-319-42061-5">https://doi.org/10.1007/978-3-319-42061-5</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086066 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48057-2">https://doi.org/10.1007/978-3-319-48057-2</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086070 2024-05-26T16:11:49Z 2024-05-26T16:11:49Z by&#160;Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format:&#160;Electronic Resources<br/>