Search Results for - Narrowed by: 2016 - Information Systems.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092016$0025092016$0026qf$003dSUBJECT$002509Subject$002509Information$002bSystems.$002509Information$002bSystems.$0026ps$003d300?2024-05-26T16:11:49ZCloud Computing and Services Science 5th International Conference, CLOSER 2015, Lisbon, Portugal, May 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20845542024-05-26T16:11:49Z2024-05-26T16:11:49Zby Helfert, Markus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29582-4">https://doi.org/10.1007/978-3-319-29582-4</a><br/>Format: Electronic Resources<br/>Co-production in the Public Sector Experiences and Challengesent://SD_ILS/0/SD_ILS:20846942024-05-26T16:11:49Z2024-05-26T16:11:49Zby Fugini, Mariagrazia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30558-5">https://doi.org/10.1007/978-3-319-30558-5</a><br/>Format: Electronic Resources<br/>Shared Services and Outsourcing: A Contemporary Outlook 10th Global Sourcing Workshop 2016, Val d'Isère, France, February 16-19, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848462024-05-26T16:11:49Z2024-05-26T16:11:49Zby Kotlarsky, Julia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47009-2">https://doi.org/10.1007/978-3-319-47009-2</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:20852462024-05-26T16:11:49Z2024-05-26T16:11:49Zby Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48671-0">https://doi.org/10.1007/978-3-319-48671-0</a><br/>Format: Electronic Resources<br/>Managing Software Process Evolution Traditional, Agile and Beyond – How to Handle Process Changeent://SD_ILS/0/SD_ILS:20850102024-05-26T16:11:49Z2024-05-26T16:11:49Zby Kuhrmann, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31545-4">https://doi.org/10.1007/978-3-319-31545-4</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850152024-05-26T16:11:49Z2024-05-26T16:11:49Zby Caballero, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40667-1">https://doi.org/10.1007/978-3-319-40667-1</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850892024-05-26T16:11:49Z2024-05-26T16:11:49Zby Zhu, Quanyan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47413-7">https://doi.org/10.1007/978-3-319-47413-7</a><br/>Format: Electronic Resources<br/>Business Process Management 14th International Conference, BPM 2016, Rio de Janeiro, Brazil, September 18-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20857682024-05-26T16:11:49Z2024-05-26T16:11:49Zby La Rosa, Marcello. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45348-4">https://doi.org/10.1007/978-3-319-45348-4</a><br/>Format: Electronic Resources<br/>Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859282024-05-26T16:11:49Z2024-05-26T16:11:49Zby Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46598-2">https://doi.org/10.1007/978-3-319-46598-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20859622024-05-26T16:11:49Z2024-05-26T16:11:49Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53008-5">https://doi.org/10.1007/978-3-662-53008-5</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857262024-05-26T16:11:49Z2024-05-26T16:11:49Zby Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48965-0">https://doi.org/10.1007/978-3-319-48965-0</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861532024-05-26T16:11:49Z2024-05-26T16:11:49Zby Tryfonas, Theo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39381-0">https://doi.org/10.1007/978-3-319-39381-0</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848392024-05-26T16:11:49Z2024-05-26T16:11:49Zby Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format: Electronic Resources<br/>Software Technologies 10th International Joint Conference, ICSOFT 2015, Colmar, France, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849412024-05-26T16:11:49Z2024-05-26T16:11:49Zby Lorenz, Pascal. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30142-6">https://doi.org/10.1007/978-3-319-30142-6</a><br/>Format: Electronic Resources<br/>Agile Processes, in Software Engineering, and Extreme Programming 17th International Conference, XP 2016, Edinburgh, UK, May 24-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20846022024-05-26T16:11:49Z2024-05-26T16:11:49Zby Sharp, Helen. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33515-5">https://doi.org/10.1007/978-3-319-33515-5</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20852302024-05-26T16:11:49Z2024-05-26T16:11:49Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40367-0">https://doi.org/10.1007/978-3-319-40367-0</a><br/>Format: Electronic Resources<br/>Social, Cultural, and Behavioral Modeling 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28 - July 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852312024-05-26T16:11:49Z2024-05-26T16:11:49Zby Xu, Kevin S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39931-7">https://doi.org/10.1007/978-3-319-39931-7</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854282024-05-26T16:11:49Z2024-05-26T16:11:49Zby Monrose, Fabian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45719-2">https://doi.org/10.1007/978-3-319-45719-2</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:20857472024-05-26T16:11:49Z2024-05-26T16:11:49Zby Homma, Naofumi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31271-2">https://doi.org/10.1007/978-3-319-31271-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855852024-05-26T16:11:49Z2024-05-26T16:11:49Zby Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49896-5">https://doi.org/10.1007/978-3-662-49896-5</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854062024-05-26T16:11:49Z2024-05-26T16:11:49Zby Lambrinoudakis, Costas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31811-0">https://doi.org/10.1007/978-3-319-31811-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20858002024-05-26T16:11:49Z2024-05-26T16:11:49Zby Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53890-6">https://doi.org/10.1007/978-3-662-53890-6</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858022024-05-26T16:11:49Z2024-05-26T16:11:49Zby Zikas, Vassilis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44618-9">https://doi.org/10.1007/978-3-319-44618-9</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data and Processes 6th International Provenance and Annotation Workshop, IPAW 2016, McLean, VA, USA, June 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859962024-05-26T16:11:49Z2024-05-26T16:11:49Zby Mattoso, Marta. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40593-3">https://doi.org/10.1007/978-3-319-40593-3</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing 14th International Conference, ICSOC 2016, Banff, AB, Canada, October 10-13, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860032024-05-26T16:11:49Z2024-05-26T16:11:49Zby Sheng, Quan Z. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46295-0">https://doi.org/10.1007/978-3-319-46295-0</a><br/>Format: Electronic Resources<br/>Evaluation of Novel Approaches to Software Engineering 10th International Conference, ENASE 2015, Barcelona, Spain, April 29–30, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844142024-05-26T16:11:49Z2024-05-26T16:11:49Zby Maciaszek, Leszek A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30243-0">https://doi.org/10.1007/978-3-319-30243-0</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842542024-05-26T16:11:49Z2024-05-26T16:11:49Zby Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format: Electronic Resources<br/>Software Quality. The Future of Systems- and Software Development 8th International Conference, SWQD 2016, Vienna, Austria, January 18-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20844382024-05-26T16:11:49Z2024-05-26T16:11:49Zby Winkler, Dietmar. editor.<br/><a href="https://doi.org/10.1007/978-3-319-27033-3">https://doi.org/10.1007/978-3-319-27033-3</a><br/>Format: Electronic Resources<br/>Pragmatic Evaluation of Software Architecturesent://SD_ILS/0/SD_ILS:20847612024-05-26T16:11:49Z2024-05-26T16:11:49Zby Knodel, Jens. author.<br/><a href="https://doi.org/10.1007/978-3-319-34177-4">https://doi.org/10.1007/978-3-319-34177-4</a><br/>Format: Electronic Resources<br/>Software Process Improvement and Capability Determination 16th International Conference, SPICE 2016, Dublin, Ireland, June 9-10, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20846742024-05-26T16:11:49Z2024-05-26T16:11:49Zby Clarke, Paul M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-38980-6">https://doi.org/10.1007/978-3-319-38980-6</a><br/>Format: Electronic Resources<br/>Collaboration in a Hyperconnected World 17th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2016, Porto, Portugal, October 3-5, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848422024-05-26T16:11:49Z2024-05-26T16:11:49Zby Afsarmanesh, Hamideh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45390-3">https://doi.org/10.1007/978-3-319-45390-3</a><br/>Format: Electronic Resources<br/>Beyond Interpretivism? New Encounters with Technology and Organization IFIP WG 8.2 Working Conference on Information Systems and Organizations, IS&O 2016, Dublin, Ireland, December 9-10, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848432024-05-26T16:11:49Z2024-05-26T16:11:49Zby Introna, Lucas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49733-4">https://doi.org/10.1007/978-3-319-49733-4</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847162024-05-26T16:11:49Z2024-05-26T16:11:49Zby Aspinall, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41763-9">https://doi.org/10.1007/978-3-319-41763-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20857352024-05-26T16:11:49Z2024-05-26T16:11:49Zby Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49890-3">https://doi.org/10.1007/978-3-662-49890-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:20857362024-05-26T16:11:49Z2024-05-26T16:11:49Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53015-3">https://doi.org/10.1007/978-3-662-53015-3</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20857372024-05-26T16:11:49Z2024-05-26T16:11:49Zby Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49387-8">https://doi.org/10.1007/978-3-662-49387-8</a><br/>Format: Electronic Resources<br/>Advances in Network Science 12th International Conference and School, NetSci-X 2016, Wroclaw, Poland, January 11-13, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20855492024-05-26T16:11:49Z2024-05-26T16:11:49Zby Wierzbicki, Adam. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28361-6">https://doi.org/10.1007/978-3-319-28361-6</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854652024-05-26T16:11:49Z2024-05-26T16:11:49Zby Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45931-8">https://doi.org/10.1007/978-3-319-45931-8</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20856762024-05-26T16:11:49Z2024-05-26T16:11:49Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format: Electronic Resources<br/>Transactions on Modularity and Composition Ient://SD_ILS/0/SD_ILS:20858312024-05-26T16:11:49Z2024-05-26T16:11:49Zby Chiba, Shigeru. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46969-0">https://doi.org/10.1007/978-3-319-46969-0</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20858402024-05-26T16:11:49Z2024-05-26T16:11:49Zby Yang, Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-42836-9">https://doi.org/10.1007/978-3-319-42836-9</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20856852024-05-26T16:11:49Z2024-05-26T16:11:49Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40253-6">https://doi.org/10.1007/978-3-319-40253-6</a><br/>Format: Electronic Resources<br/>Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856982024-05-26T16:11:49Z2024-05-26T16:11:49Zby Lam, Kwok-Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50011-9">https://doi.org/10.1007/978-3-319-50011-9</a><br/>Format: Electronic Resources<br/>Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20–22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859532024-05-26T16:11:49Z2024-05-26T16:11:49Zby Kim, Ho-won. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31875-2">https://doi.org/10.1007/978-3-319-31875-2</a><br/>Format: Electronic Resources<br/>FM 2016: Formal Methods 21st International Symposium, Limassol, Cyprus, November 9-11, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859582024-05-26T16:11:49Z2024-05-26T16:11:49Zby Fitzgerald, John. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48989-6">https://doi.org/10.1007/978-3-319-48989-6</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859802024-05-26T16:11:49Z2024-05-26T16:11:49Zby Katsikas, Sokratis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44341-6">https://doi.org/10.1007/978-3-319-44341-6</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861432024-05-26T16:11:49Z2024-05-26T16:11:49Zby Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861442024-05-26T16:11:49Z2024-05-26T16:11:49Zby Bao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49151-6">https://doi.org/10.1007/978-3-319-49151-6</a><br/>Format: Electronic Resources<br/>The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthdayent://SD_ILS/0/SD_ILS:20861542024-05-26T16:11:49Z2024-05-26T16:11:49Zby Ryan, Peter Y. A. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49301-4">https://doi.org/10.1007/978-3-662-49301-4</a><br/>Format: Electronic Resources<br/>Formal Methods: Foundations and Applications 18th Brazilian Symposium, SBMF 2015, Belo Horizonte, Brazil, September 21-22, 2015, Proceedingsent://SD_ILS/0/SD_ILS:20861552024-05-26T16:11:49Z2024-05-26T16:11:49Zby Cornélio, Márcio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29473-5">https://doi.org/10.1007/978-3-319-29473-5</a><br/>Format: Electronic Resources<br/>Mobility Management Principle, Technology and Applicationsent://SD_ILS/0/SD_ILS:20865652024-05-26T16:11:49Z2024-05-26T16:11:49Zby Chen, Shanzhi. author.<br/><a href="https://doi.org/10.1007/978-3-662-52726-9">https://doi.org/10.1007/978-3-662-52726-9</a><br/>Format: Electronic Resources<br/>Software Engineering for Resilient Systems 8th International Workshop, SERENE 2016, Gothenburg, Sweden, September 5-6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858982024-05-26T16:11:49Z2024-05-26T16:11:49Zby Crnkovic, Ivica. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45892-2">https://doi.org/10.1007/978-3-319-45892-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860592024-05-26T16:11:49Z2024-05-26T16:11:49Zby Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53887-6">https://doi.org/10.1007/978-3-662-53887-6</a><br/>Format: Electronic Resources<br/>Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papersent://SD_ILS/0/SD_ILS:20860622024-05-26T16:11:49Z2024-05-26T16:11:49Zby Bécue, Adrien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40385-4">https://doi.org/10.1007/978-3-319-40385-4</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20860632024-05-26T16:11:49Z2024-05-26T16:11:49Zby Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Logistics and Supply Chain Innovation Bridging the Gap between Theory and Practiceent://SD_ILS/0/SD_ILS:20866922024-05-26T16:11:49Z2024-05-26T16:11:49Zby Zijm, Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-22288-2">https://doi.org/10.1007/978-3-319-22288-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860992024-05-26T16:11:49Z2024-05-26T16:11:49Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53018-4">https://doi.org/10.1007/978-3-662-53018-4</a><br/>Format: Electronic Resources<br/>Managing Information Technologyent://SD_ILS/0/SD_ILS:20840892024-05-26T16:11:49Z2024-05-26T16:11:49Zby Castillo, Francisco. author.<br/><a href="https://doi.org/10.1007/978-3-319-38891-5">https://doi.org/10.1007/978-3-319-38891-5</a><br/>Format: Electronic Resources<br/>Tamed Agility Pragmatic Contracting and Collaboration in Agile Software Projectsent://SD_ILS/0/SD_ILS:20847682024-05-26T16:11:49Z2024-05-26T16:11:49Zby Book, Matthias. author.<br/><a href="https://doi.org/10.1007/978-3-319-41478-2">https://doi.org/10.1007/978-3-319-41478-2</a><br/>Format: Electronic Resources<br/>Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847772024-05-26T16:11:49Z2024-05-26T16:11:49Zby Haltinner, Kristin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28313-5">https://doi.org/10.1007/978-3-319-28313-5</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852382024-05-26T16:11:49Z2024-05-26T16:11:49Zby Franz, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45572-3">https://doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852562024-05-26T16:11:49Z2024-05-26T16:11:49Zby Gierlichs, Benedikt. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53140-2">https://doi.org/10.1007/978-3-662-53140-2</a><br/>Format: Electronic Resources<br/>Software Architecture 10th European Conference, ECSA 2016, Copenhagen, Denmark, November 28 -- December 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852602024-05-26T16:11:49Z2024-05-26T16:11:49Zby Tekinerdogan, Bedir. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48992-6">https://doi.org/10.1007/978-3-319-48992-6</a><br/>Format: Electronic Resources<br/>Product-Focused Software Process Improvement 17th International Conference, PROFES 2016, Trondheim, Norway, November 22-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852622024-05-26T16:11:49Z2024-05-26T16:11:49Zby Abrahamsson, Pekka. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49094-6">https://doi.org/10.1007/978-3-319-49094-6</a><br/>Format: Electronic Resources<br/>Advanced Multimedia and Ubiquitous Engineering FutureTech & MUEent://SD_ILS/0/SD_ILS:20840362024-05-26T16:11:49Z2024-05-26T16:11:49Zby Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-981-10-1536-6">https://doi.org/10.1007/978-981-10-1536-6</a><br/>Format: Electronic Resources<br/>Modeling with UML Language, Concepts, Methodsent://SD_ILS/0/SD_ILS:20847412024-05-26T16:11:49Z2024-05-26T16:11:49Zby Rumpe, Bernhard. author.<br/><a href="https://doi.org/10.1007/978-3-319-33933-7">https://doi.org/10.1007/978-3-319-33933-7</a><br/>Format: Electronic Resources<br/>Guide to Software Development Designing and Managing the Life Cycleent://SD_ILS/0/SD_ILS:20847702024-05-26T16:11:49Z2024-05-26T16:11:49Zby Langer, Arthur M. author.<br/><a href="https://doi.org/10.1007/978-1-4471-6799-0">https://doi.org/10.1007/978-1-4471-6799-0</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841052024-05-26T16:11:49Z2024-05-26T16:11:49Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format: Electronic Resources<br/>Product Lifecycle Management for Digital Transformation of Industries 13th IFIP WG 5.1 International Conference, PLM 2016, Columbia, SC, USA, July 11-13, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20841082024-05-26T16:11:49Z2024-05-26T16:11:49Zby Harik, Ramy. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54660-5">https://doi.org/10.1007/978-3-319-54660-5</a><br/>Format: Electronic Resources<br/>Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850362024-05-26T16:11:49Z2024-05-26T16:11:49Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format: Electronic Resources<br/>Evaluation of Novel Approaches to Software Engineering 11th International Conference, ENASE 2016, Rome, Italy, April 27–28, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20843672024-05-26T16:11:49Z2024-05-26T16:11:49Zby Maciaszek, Leszek A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56390-9">https://doi.org/10.1007/978-3-319-56390-9</a><br/>Format: Electronic Resources<br/>Transactions on Foundations for Mastering Change Ient://SD_ILS/0/SD_ILS:20861172024-05-26T16:11:49Z2024-05-26T16:11:49Zby Steffen, Bernhard. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46508-1">https://doi.org/10.1007/978-3-319-46508-1</a><br/>Format: Electronic Resources<br/>Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861262024-05-26T16:11:49Z2024-05-26T16:11:49Zby Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20854392024-05-26T16:11:49Z2024-05-26T16:11:49Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854432024-05-26T16:11:49Z2024-05-26T16:11:49Zby Bica, Ion. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47238-6">https://doi.org/10.1007/978-3-319-47238-6</a><br/>Format: Electronic Resources<br/>Systems, Software and Services Process Improvement 23rd European Conference, EuroSPI 2016, Graz, Austria, September 14-16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848852024-05-26T16:11:49Z2024-05-26T16:11:49Zby Kreiner, Christian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44817-6">https://doi.org/10.1007/978-3-319-44817-6</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857322024-05-26T16:11:49Z2024-05-26T16:11:49Zby Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29360-8">https://doi.org/10.1007/978-3-319-29360-8</a><br/>Format: Electronic Resources<br/>Open Source Systems: Integrating Communities 12th IFIP WG 2.13 International Conference, OSS 2016, Gothenburg, Sweden, May 30 - June 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20849992024-05-26T16:11:49Z2024-05-26T16:11:49Zby Crowston, Kevin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39225-7">https://doi.org/10.1007/978-3-319-39225-7</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850162024-05-26T16:11:49Z2024-05-26T16:11:49Zby Peyrin, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-52993-5">https://doi.org/10.1007/978-3-662-52993-5</a><br/>Format: Electronic Resources<br/>Formal Aspects of Component Software 12th International Conference, FACS 2015, Niterói, Brazil, October 14-16, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857862024-05-26T16:11:49Z2024-05-26T16:11:49Zby Braga, Christiano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28934-2">https://doi.org/10.1007/978-3-319-28934-2</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857092024-05-26T16:11:49Z2024-05-26T16:11:49Zby Pointcheval, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31517-1">https://doi.org/10.1007/978-3-319-31517-1</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857132024-05-26T16:11:49Z2024-05-26T16:11:49Zby Standaert, François-Xavier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43283-0">https://doi.org/10.1007/978-3-319-43283-0</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860062024-05-26T16:11:49Z2024-05-26T16:11:49Zby Bonakdarpour, Borzoo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49259-9">https://doi.org/10.1007/978-3-319-49259-9</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858872024-05-26T16:11:49Z2024-05-26T16:11:49Zby Ogawa, Kazuto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format: Electronic Resources<br/>Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858882024-05-26T16:11:49Z2024-05-26T16:11:49Zby Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20860792024-05-26T16:11:49Z2024-05-26T16:11:49Zby Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format: Electronic Resources<br/>Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860872024-05-26T16:11:49Z2024-05-26T16:11:49Zby Livraga, Giovanni. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47072-6">https://doi.org/10.1007/978-3-319-47072-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860952024-05-26T16:11:49Z2024-05-26T16:11:49Zby Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format: Electronic Resources<br/>Enterprise Interoperability VII Enterprise Interoperability in the Digitized and Networked Factory of the Futureent://SD_ILS/0/SD_ILS:20876942024-05-26T16:11:49Z2024-05-26T16:11:49Zby Mertins, Kai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30957-6">https://doi.org/10.1007/978-3-319-30957-6</a><br/>Format: Electronic Resources<br/>Electronic Government and the Information Systems Perspective 5th International Conference, EGOVIS 2016, Porto, Portugal, September 5-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20862082024-05-26T16:11:49Z2024-05-26T16:11:49Zby Kő, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44159-7">https://doi.org/10.1007/978-3-319-44159-7</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20857042024-05-26T16:11:49Z2024-05-26T16:11:49Zby Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49384-7">https://doi.org/10.1007/978-3-662-49384-7</a><br/>Format: Electronic Resources<br/>Web Services, Formal Methods, and Behavioral Types 11th International Workshop, WS-FM 2014, Eindhoven, The Netherlands, September 11-12, 2014, and 12th International Workshop, WS-FM/BEAT 2015, Madrid, Spain, September 4-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860782024-05-26T16:11:49Z2024-05-26T16:11:49Zby Hildebrandt, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33612-1">https://doi.org/10.1007/978-3-319-33612-1</a><br/>Format: Electronic Resources<br/>Requirements Engineering: Foundation for Software Quality 22nd International Working Conference, REFSQ 2016, Gothenburg, Sweden, March 14-17, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857012024-05-26T16:11:49Z2024-05-26T16:11:49Zby Daneva, Maya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30282-9">https://doi.org/10.1007/978-3-319-30282-9</a><br/>Format: Electronic Resources<br/>Formal SQL Tuning for Oracle Databases Practical Efficiency - Efficient Practiceent://SD_ILS/0/SD_ILS:20843652024-05-26T16:11:49Z2024-05-26T16:11:49Zby Nossov, Leonid. author.<br/><a href="https://doi.org/10.1007/978-3-662-50417-8">https://doi.org/10.1007/978-3-662-50417-8</a><br/>Format: Electronic Resources<br/>Product Lifecycle Management in the Era of Internet of Things 12th IFIP WG 5.1 International Conference, PLM 2015, Doha, Qatar, October 19-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20841742024-05-26T16:11:49Z2024-05-26T16:11:49Zby Bouras, Abdelaziz. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33111-9">https://doi.org/10.1007/978-3-319-33111-9</a><br/>Format: Electronic Resources<br/>Data Science and Big Data Computing Frameworks and Methodologiesent://SD_ILS/0/SD_ILS:20848742024-05-26T16:11:49Z2024-05-26T16:11:49Zby Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31861-5">https://doi.org/10.1007/978-3-319-31861-5</a><br/>Format: Electronic Resources<br/>Testing Software and Systems 28th IFIP WG 6.1 International Conference, ICTSS 2016, Graz, Austria, October 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854412024-05-26T16:11:49Z2024-05-26T16:11:49Zby Wotawa, Franz. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47443-4">https://doi.org/10.1007/978-3-319-47443-4</a><br/>Format: Electronic Resources<br/>Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:20857282024-05-26T16:11:49Z2024-05-26T16:11:49Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29883-2">https://doi.org/10.1007/978-3-319-29883-2</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857292024-05-26T16:11:49Z2024-05-26T16:11:49Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2–8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857442024-05-26T16:11:49Z2024-05-26T16:11:49Zby Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20857452024-05-26T16:11:49Z2024-05-26T16:11:49Zby Karagiannis, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30505-9">https://doi.org/10.1007/978-3-319-30505-9</a><br/>Format: Electronic Resources<br/>Service-Oriented and Cloud Computing 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850822024-05-26T16:11:49Z2024-05-26T16:11:49Zby Aiello, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44482-6">https://doi.org/10.1007/978-3-319-44482-6</a><br/>Format: Electronic Resources<br/>Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850862024-05-26T16:11:49Z2024-05-26T16:11:49Zby Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format: Electronic Resources<br/>System Analysis and Modeling. Technology-Specific Aspects of Models 9th International Conference, SAM 2016, Saint-Melo, France, October 3-4, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20850872024-05-26T16:11:49Z2024-05-26T16:11:49Zby Grabowski, Jens. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46613-2">https://doi.org/10.1007/978-3-319-46613-2</a><br/>Format: Electronic Resources<br/>Multiple Access Communications 9th International Workshop, MACOM 2016, Aalborg, Denmark, November 21-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850952024-05-26T16:11:49Z2024-05-26T16:11:49Zby Madsen, Tatiana K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51376-8">https://doi.org/10.1007/978-3-319-51376-8</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850972024-05-26T16:11:49Z2024-05-26T16:11:49Zby Rome, Erich. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33331-1">https://doi.org/10.1007/978-3-319-33331-1</a><br/>Format: Electronic Resources<br/>Model and Data Engineering 6th International Conference, MEDI 2016, Almería, Spain, September 21-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856142024-05-26T16:11:49Z2024-05-26T16:11:49Zby Bellatreche, Ladjel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45547-1">https://doi.org/10.1007/978-3-319-45547-1</a><br/>Format: Electronic Resources<br/>Formal Methods: Foundations and Applications 19th Brazilian Symposium, SBMF 2016, Natal, Brazil, November 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856182024-05-26T16:11:49Z2024-05-26T16:11:49Zby Ribeiro, Leila. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49815-7">https://doi.org/10.1007/978-3-319-49815-7</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lecturesent://SD_ILS/0/SD_ILS:20858582024-05-26T16:11:49Z2024-05-26T16:11:49Zby Aldini, Alessandro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format: Electronic Resources<br/>Mathematical and Engineering Methods in Computer Science 10th International Doctoral Workshop, MEMICS 2015, Telč, Czech Republic, October 23–25, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20855252024-05-26T16:11:49Z2024-05-26T16:11:49Zby Kofroň, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29817-7">https://doi.org/10.1007/978-3-319-29817-7</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:20855262024-05-26T16:11:49Z2024-05-26T16:11:49Zby Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859862024-05-26T16:11:49Z2024-05-26T16:11:49Zby Badonnel, Rémi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39814-3">https://doi.org/10.1007/978-3-319-39814-3</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858122024-05-26T16:11:49Z2024-05-26T16:11:49Zby Chen, Jiageng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46298-1">https://doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861582024-05-26T16:11:49Z2024-05-26T16:11:49Zby Kwon, Soonhak. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30840-1">https://doi.org/10.1007/978-3-319-30840-1</a><br/>Format: Electronic Resources<br/>Modelling Foundations and Applications 12th European Conference, ECMFA 2016, Held as Part of STAF 2016, Vienna, Austria, July 6-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858202024-05-26T16:11:49Z2024-05-26T16:11:49Zby Wąsowski, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-319-42061-5">https://doi.org/10.1007/978-3-319-42061-5</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860662024-05-26T16:11:49Z2024-05-26T16:11:49Zby Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48057-2">https://doi.org/10.1007/978-3-319-48057-2</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860702024-05-26T16:11:49Z2024-05-26T16:11:49Zby Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format: Electronic Resources<br/>