Search Results for - Narrowed by: Computer Communication Networks. - Computers and Society.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026qf$003dSUBJECT$002509Subject$002509Computers$002band$002bSociety.$002509Computers$002band$002bSociety.$0026ps$003d300?2024-06-18T00:11:25ZSmart Grid and Innovative Frontiers in Telecommunications Third International Conference, SmartGIFT 2018, Auckland, New Zealand, April 23-24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20849302024-06-18T00:11:25Z2024-06-18T00:11:25Zby Chong, Peter Han Joo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94965-9">https://doi.org/10.1007/978-3-319-94965-9</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XIV 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842382024-06-18T00:11:25Z2024-06-18T00:11:25Zby Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99277-8">https://doi.org/10.1007/978-3-319-99277-8</a><br/>Format: Electronic Resources<br/>Handbook of Mobile Data Privacyent://SD_ILS/0/SD_ILS:20843032024-06-18T00:11:25Z2024-06-18T00:11:25Zby Gkoulalas-Divanis, Aris. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852902024-06-18T00:11:25Z2024-06-18T00:11:25Zby Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format: Electronic Resources<br/>Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859042024-06-18T00:11:25Z2024-06-18T00:11:25Zby Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852532024-06-18T00:11:25Z2024-06-18T00:11:25Zby Dinur, Itai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format: Electronic Resources<br/>Innovation and Interdisciplinary Solutions for Underserved Areas First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11–12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848902024-06-18T00:11:25Z2024-06-18T00:11:25Zby M. F. Kebe, Cheikh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72965-7">https://doi.org/10.1007/978-3-319-72965-7</a><br/>Format: Electronic Resources<br/>Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852122024-06-18T00:11:25Z2024-06-18T00:11:25Zby Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format: Electronic Resources<br/>Emerging Technologies for Developing Countries First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedingsent://SD_ILS/0/SD_ILS:20847182024-06-18T00:11:25Z2024-06-18T00:11:25Zby Belqasmi, Fatna. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67837-5">https://doi.org/10.1007/978-3-319-67837-5</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20847202024-06-18T00:11:25Z2024-06-18T00:11:25Zby Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852132024-06-18T00:11:25Z2024-06-18T00:11:25Zby Gruschka, Nils. editor. (orcid)0000-0001-7360-8314<br/><a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format: Electronic Resources<br/>Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20856232024-06-18T00:11:25Z2024-06-18T00:11:25Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format: Electronic Resources<br/>A Brief History of Everything Wireless How Invisible Waves Have Changed the Worldent://SD_ILS/0/SD_ILS:20846322024-06-18T00:11:25Z2024-06-18T00:11:25Zby Launiainen, Petri. author.<br/><a href="https://doi.org/10.1007/978-3-319-78910-1">https://doi.org/10.1007/978-3-319-78910-1</a><br/>Format: Electronic Resources<br/>Management Perspective for Transport Telematics 18th International Conference on Transport System Telematics, TST 2018, Krakow, Poland, March 20-23, 2018, Selected Papersent://SD_ILS/0/SD_ILS:20842992024-06-18T00:11:25Z2024-06-18T00:11:25Zby Mikulski, Jerzy. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97955-7">https://doi.org/10.1007/978-3-319-97955-7</a><br/>Format: Electronic Resources<br/>e-Infrastructure and e-Services for Developing Countries 8th International Conference, AFRICOMM 2016, Ouagadougou, Burkina Faso, December 6-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20847912024-06-18T00:11:25Z2024-06-18T00:11:25Zby Bissyande, Tegawendé F. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66742-3">https://doi.org/10.1007/978-3-319-66742-3</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20855382024-06-18T00:11:25Z2024-06-18T00:11:25Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Engineering Multi-Agent Systems 5th International Workshop, EMAS 2017, Sao Paulo, Brazil, May 8-9, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20853552024-06-18T00:11:25Z2024-06-18T00:11:25Zby El Fallah-Seghrouchni, Amal. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91899-0">https://doi.org/10.1007/978-3-319-91899-0</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854642024-06-18T00:11:25Z2024-06-18T00:11:25Zby D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852992024-06-18T00:11:25Z2024-06-18T00:11:25Zby Bailey, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00470-5">https://doi.org/10.1007/978-3-030-00470-5</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854992024-06-18T00:11:25Z2024-06-18T00:11:25Zby Furnell, Steven. editor. (orcid)0000-0003-0984-7542<br/><a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860402024-06-18T00:11:25Z2024-06-18T00:11:25Zby Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Mobile Networks and Management 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20845422024-06-18T00:11:25Z2024-06-18T00:11:25Zby Hu, Jiankun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-90775-8">https://doi.org/10.1007/978-3-319-90775-8</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853432024-06-18T00:11:25Z2024-06-18T00:11:25Zby Camenisch, Jan. editor. (orcid)0000-0001-6654-9459<br/><a href="https://doi.org/10.1007/978-3-030-00434-7">https://doi.org/10.1007/978-3-030-00434-7</a><br/>Format: Electronic Resources<br/>From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthdayent://SD_ILS/0/SD_ILS:20853642024-06-18T00:11:25Z2024-06-18T00:11:25Zby Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620<br/><a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855762024-06-18T00:11:25Z2024-06-18T00:11:25Zby Negi, Atul. editor. (orcid)0000-0001-5707-130X<br/><a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 19th International Conference, PAM 2018, Berlin, Germany, March 26–27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858482024-06-18T00:11:25Z2024-06-18T00:11:25Zby Beverly, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76481-8">https://doi.org/10.1007/978-3-319-76481-8</a><br/>Format: Electronic Resources<br/>Mobility Analytics for Spatio-Temporal and Social Data First International Workshop, MATES 2017, Munich, Germany, September 1, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860202024-06-18T00:11:25Z2024-06-18T00:11:25Zby Doulkeridis, Christos. editor. (orcid)0000-0002-3219-0510<br/><a href="https://doi.org/10.1007/978-3-319-73521-4">https://doi.org/10.1007/978-3-319-73521-4</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855232024-06-18T00:11:25Z2024-06-18T00:11:25Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Challenge of Transport Telematics 16th International Conference on Transport Systems Telematics, TST 2016, Katowice-Ustroń, Poland, March 16–19, 2016, Selected Papersent://SD_ILS/0/SD_ILS:20849422024-06-18T00:11:25Z2024-06-18T00:11:25Zby Mikulski, Jerzy. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49646-7">https://doi.org/10.1007/978-3-319-49646-7</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841052024-06-18T00:11:25Z2024-06-18T00:11:25Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format: Electronic Resources<br/>Multiple Access Communications 9th International Workshop, MACOM 2016, Aalborg, Denmark, November 21-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850952024-06-18T00:11:25Z2024-06-18T00:11:25Zby Madsen, Tatiana K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51376-8">https://doi.org/10.1007/978-3-319-51376-8</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20860632024-06-18T00:11:25Z2024-06-18T00:11:25Zby Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2–8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857442024-06-18T00:11:25Z2024-06-18T00:11:25Zby Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:20855672024-06-18T00:11:25Z2024-06-18T00:11:25Zby Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48674-1">https://doi.org/10.1007/978-3-319-48674-1</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852152024-06-18T00:11:25Z2024-06-18T00:11:25Zby Panayiotou, Christos G. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31664-2">https://doi.org/10.1007/978-3-319-31664-2</a><br/>Format: Electronic Resources<br/>Mobile Web and Intelligent Information Systems 13th International Conference, MobiWIS 2016, Vienna, Austria, August 22-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854192024-06-18T00:11:25Z2024-06-18T00:11:25Zby Younas, Muhammad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44215-0">https://doi.org/10.1007/978-3-319-44215-0</a><br/>Format: Electronic Resources<br/>Human Aspects of IT for the Aged Population. Design for Aging Second International Conference, ITAP 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17–22, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20858082024-06-18T00:11:25Z2024-06-18T00:11:25Zby Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39943-0">https://doi.org/10.1007/978-3-319-39943-0</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858122024-06-18T00:11:25Z2024-06-18T00:11:25Zby Chen, Jiageng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46298-1">https://doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Human Aspects of IT for the Aged Population. Healthy and Active Aging Second International Conference, ITAP 2016, Held as Part of HCI International 2016 Toronto, ON, Canada, July 17–22, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20859992024-06-18T00:11:25Z2024-06-18T00:11:25Zby Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39949-2">https://doi.org/10.1007/978-3-319-39949-2</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850972024-06-18T00:11:25Z2024-06-18T00:11:25Zby Rome, Erich. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33331-1">https://doi.org/10.1007/978-3-319-33331-1</a><br/>Format: Electronic Resources<br/>Social, Cultural, and Behavioral Modeling 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28 - July 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852312024-06-18T00:11:25Z2024-06-18T00:11:25Zby Xu, Kevin S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39931-7">https://doi.org/10.1007/978-3-319-39931-7</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:20852462024-06-18T00:11:25Z2024-06-18T00:11:25Zby Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48671-0">https://doi.org/10.1007/978-3-319-48671-0</a><br/>Format: Electronic Resources<br/>Ubiquitous Computing and Ambient Intelligence 10th International Conference, UCAmI 2016, San Bartolomé de Tirajana, Gran Canaria, Spain, November 29 – December 2, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20852472024-06-18T00:11:25Z2024-06-18T00:11:25Zby García, Carmelo R. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48746-5">https://doi.org/10.1007/978-3-319-48746-5</a><br/>Format: Electronic Resources<br/>Smart Cities First International Conference, Smart-CT 2016, Málaga, Spain, June 15-17, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854272024-06-18T00:11:25Z2024-06-18T00:11:25Zby Alba, Enrique. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39595-1">https://doi.org/10.1007/978-3-319-39595-1</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848772024-06-18T00:11:25Z2024-06-18T00:11:25Zby Doss, Robin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48021-3">https://doi.org/10.1007/978-3-319-48021-3</a><br/>Format: Electronic Resources<br/>Social Robotics 8th International Conference, ICSR 2016, Kansas City, MO, USA, November 1-3, 2016 Proceedingsent://SD_ILS/0/SD_ILS:20856872024-06-18T00:11:25Z2024-06-18T00:11:25Zby Agah, Arvin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47437-3">https://doi.org/10.1007/978-3-319-47437-3</a><br/>Format: Electronic Resources<br/>Persuasive Technology 11th International Conference, PERSUASIVE 2016, Salzburg, Austria, April 5-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860362024-06-18T00:11:25Z2024-06-18T00:11:25Zby Meschtscherjakov, Alexander. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31510-2">https://doi.org/10.1007/978-3-319-31510-2</a><br/>Format: Electronic Resources<br/>Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858882024-06-18T00:11:25Z2024-06-18T00:11:25Zby Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format: Electronic Resources<br/>Engineering Multi-Agent Systems 4th International Workshop, EMAS 2016, Singapore, Singapore, May 9-10, 2016, Revised, Selected, and Invited Papersent://SD_ILS/0/SD_ILS:20860512024-06-18T00:11:25Z2024-06-18T00:11:25Zby Baldoni, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50983-9">https://doi.org/10.1007/978-3-319-50983-9</a><br/>Format: Electronic Resources<br/>Smart City 360° First EAI International Summit, Smart City 360°, Bratislava, Slovakia and Toronto, Canada, October 13-16, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:20849672024-06-18T00:11:25Z2024-06-18T00:11:25Zby Leon-Garcia, Alberto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33681-7">https://doi.org/10.1007/978-3-319-33681-7</a><br/>Format: Electronic Resources<br/>e-Infrastructure and e-Services 7th International Conference, AFRICOMM 2015, Cotonou, Benin, December 15-16, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849862024-06-18T00:11:25Z2024-06-18T00:11:25Zby Glitho, Roch. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43696-8">https://doi.org/10.1007/978-3-319-43696-8</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848752024-06-18T00:11:25Z2024-06-18T00:11:25Zby Hoepman, Jaap-Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33630-5">https://doi.org/10.1007/978-3-319-33630-5</a><br/>Format: Electronic Resources<br/>Ubiquitous Computing and Ambient Intelligence 10th International Conference, UCAmI 2016, San Bartolomé de Tirajana, Gran Canaria, Spain, November 29 – December 2, 2016, Part IIent://SD_ILS/0/SD_ILS:20857072024-06-18T00:11:25Z2024-06-18T00:11:25Zby García, Carmelo R. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48799-1">https://doi.org/10.1007/978-3-319-48799-1</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857292024-06-18T00:11:25Z2024-06-18T00:11:25Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:20855262024-06-18T00:11:25Z2024-06-18T00:11:25Zby Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861262024-06-18T00:11:25Z2024-06-18T00:11:25Zby Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>Towards Sustainable Society on Ubiquitous Networks The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24–16, 2008, Tokyo, Japanent://SD_ILS/0/SD_ILS:5020032024-06-18T00:11:25Z2024-06-18T00:11:25Zby Oya, Makoto. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-85691-9">http://dx.doi.org/10.1007/978-0-387-85691-9</a><br/>Format: Electronic Resources<br/>Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027502024-06-18T00:11:25Z2024-06-18T00:11:25Zby Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5036102024-06-18T00:11:25Z2024-06-18T00:11:25Zby Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format: Electronic Resources<br/>Advanced Web and Network Technologies, and Applications APWeb 2008 International Workshops: BIDM, IWHDM, and DeWeb Shenyang, China, April 26-28, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5038072024-06-18T00:11:25Z2024-06-18T00:11:25Zby Ishikawa, Yoshiharu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89376-9">http://dx.doi.org/10.1007/978-3-540-89376-9</a><br/>Format: Electronic Resources<br/>Digital Human Modeling Trends in Human Algorithmsent://SD_ILS/0/SD_ILS:5038102024-06-18T00:11:25Z2024-06-18T00:11:25Zby Cai, Yang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89430-8">http://dx.doi.org/10.1007/978-3-540-89430-8</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5035332024-06-18T00:11:25Z2024-06-18T00:11:25Zby Pei, Dingyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038182024-06-18T00:11:25Z2024-06-18T00:11:25Zby Matsuura, Kanta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format: Electronic Resources<br/>Ambient Intelligence European Conference, AmI 2008, Nuremberg, Germany, November 19-22, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038192024-06-18T00:11:25Z2024-06-18T00:11:25Zby Aarts, Emile. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89617-3">http://dx.doi.org/10.1007/978-3-540-89617-3</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038212024-06-18T00:11:25Z2024-06-18T00:11:25Zby Franklin, Matthew K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format: Electronic Resources<br/>Public Key Cryptography – PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033722024-06-18T00:11:25Z2024-06-18T00:11:25Zby Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format: Electronic Resources<br/>Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5033752024-06-18T00:11:25Z2024-06-18T00:11:25Zby Bonchi, Francesco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78478-4">http://dx.doi.org/10.1007/978-3-540-78478-4</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038432024-06-18T00:11:25Z2024-06-18T00:11:25Zby Ortiz-Arroyo, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89900-6">http://dx.doi.org/10.1007/978-3-540-89900-6</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036842024-06-18T00:11:25Z2024-06-18T00:11:25Zby Lippmann, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format: Electronic Resources<br/>Trust in Agent Societies 11th International Workshop, TRUST 2008, Estoril, Portugal, May 12 -13, 2008. Revised Selected and Invited Papersent://SD_ILS/0/SD_ILS:5038682024-06-18T00:11:25Z2024-06-18T00:11:25Zby Falcone, Rino. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92803-4">http://dx.doi.org/10.1007/978-3-540-92803-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036002024-06-18T00:11:25Z2024-06-18T00:11:25Zby Wagner, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format: Electronic Resources<br/>Electronic Government 7th International Conference, EGOV 2008, Turin, Italy, August 31 - September 5, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036052024-06-18T00:11:25Z2024-06-18T00:11:25Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85204-9">http://dx.doi.org/10.1007/978-3-540-85204-9</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027322024-06-18T00:11:25Z2024-06-18T00:11:25Zby Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69304-8">http://dx.doi.org/10.1007/978-3-540-69304-8</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5028032024-06-18T00:11:25Z2024-06-18T00:11:25Zby Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036642024-06-18T00:11:25Z2024-06-18T00:11:25Zby Grimaud, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format: Electronic Resources<br/>Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035862024-06-18T00:11:25Z2024-06-18T00:11:25Zby Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format: Electronic Resources<br/>Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:5037892024-06-18T00:11:25Z2024-06-18T00:11:25Zby Solanki, Kaushal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format: Electronic Resources<br/>Smart Homes and Health Telematics 6th International Conference, ICOST 2008 Ames, IA, USA, June 28-July 2, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027862024-06-18T00:11:25Z2024-06-18T00:11:25Zby Helal, Sumi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69916-3">http://dx.doi.org/10.1007/978-3-540-69916-3</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5036492024-06-18T00:11:25Z2024-06-18T00:11:25Zby Furnell, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036602024-06-18T00:11:25Z2024-06-18T00:11:25Zby Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format: Electronic Resources<br/>Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037492024-06-18T00:11:25Z2024-06-18T00:11:25Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5034812024-06-18T00:11:25Z2024-06-18T00:11:25Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format: Electronic Resources<br/>Tests and Proofs Second International Conference, TAP 2008, Prato, Italy, April 9-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5034852024-06-18T00:11:25Z2024-06-18T00:11:25Zby Beckert, Bernhard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79124-9">http://dx.doi.org/10.1007/978-3-540-79124-9</a><br/>Format: Electronic Resources<br/>Groupware: Design, Implementation, and Use 14th International Workshop, CRIWG 2008, Omaha, NE, USA, September 14-18, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:5038692024-06-18T00:11:25Z2024-06-18T00:11:25Zby Briggs, Robert O. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92831-7">http://dx.doi.org/10.1007/978-3-540-92831-7</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5037932024-06-18T00:11:25Z2024-06-18T00:11:25Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format: Electronic Resources<br/>Ad-hoc, Mobile and Wireless Networks 7th International Conference, ADHOC-NOW 2008 Sophia-Antipolis, France, September 10-12, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5036062024-06-18T00:11:25Z2024-06-18T00:11:25Zby Coudert, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85209-4">http://dx.doi.org/10.1007/978-3-540-85209-4</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028272024-06-18T00:11:25Z2024-06-18T00:11:25Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format: Electronic Resources<br/>Ubiquitous Intelligence and Computing 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027292024-06-18T00:11:25Z2024-06-18T00:11:25Zby Sandnes, Frode Eika. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69293-5">http://dx.doi.org/10.1007/978-3-540-69293-5</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026912024-06-18T00:11:25Z2024-06-18T00:11:25Zby Bellovin, Steven M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Electronic Resources<br/>Constructing Ambient Intelligence AmI 2007 Workshops Darmstadt, Germany, November 7-10, 2007 Revised Papersent://SD_ILS/0/SD_ILS:5036232024-06-18T00:11:25Z2024-06-18T00:11:25Zby Mühlhäuser, Max. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85379-4">http://dx.doi.org/10.1007/978-3-540-85379-4</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing – ICSOC 2008 6th International Conference, Sydney, Australia, December 1-5, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038232024-06-18T00:11:25Z2024-06-18T00:11:25Zby Bouguettaya, Athman. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89652-4">http://dx.doi.org/10.1007/978-3-540-89652-4</a><br/>Format: Electronic Resources<br/>Modeling Communication with Robots and Virtual Humans Second ZiF Research Group International Workshop on Embodied Communication in Humans and Machines, Bielefeld, Germany, April 5-8, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5034712024-06-18T00:11:25Z2024-06-18T00:11:25Zby Wachsmuth, Ipke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79037-2">http://dx.doi.org/10.1007/978-3-540-79037-2</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035632024-06-18T00:11:25Z2024-06-18T00:11:25Zby Onieva, Jose A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format: Electronic Resources<br/>RFID Security and Privacy Concepts, Protocols, and Architecturesent://SD_ILS/0/SD_ILS:5034782024-06-18T00:11:25Z2024-06-18T00:11:25Zby Henrici, Dirk. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79076-1">http://dx.doi.org/10.1007/978-3-540-79076-1</a><br/>Format: Electronic Resources<br/>Pervasive Computing 6th International Conference, Pervasive 2008 Sydney, Australia, May 19-22, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5035432024-06-18T00:11:25Z2024-06-18T00:11:25Zby Indulska, Jadwiga. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79576-6">http://dx.doi.org/10.1007/978-3-540-79576-6</a><br/>Format: Electronic Resources<br/>Agents and Peer-to-Peer Computing 5th International Workshop, AP2PC 2006, Hakodate, Japan, May 9, 2006, Revised and Invited Papersent://SD_ILS/0/SD_ILS:5035472024-06-18T00:11:25Z2024-06-18T00:11:25Zby Joseph, Sam. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79705-0">http://dx.doi.org/10.1007/978-3-540-79705-0</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124402024-06-18T00:11:25Z2024-06-18T00:11:25Zby Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5123622024-06-18T00:11:25Z2024-06-18T00:11:25Zby Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71549-8">http://dx.doi.org/10.1007/978-3-540-71549-8</a><br/>Format: Electronic Resources<br/>Ubiquitous Convergence Technology First International Conference, ICUCT 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5123942024-06-18T00:11:25Z2024-06-18T00:11:25Zby Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71789-8">http://dx.doi.org/10.1007/978-3-540-71789-8</a><br/>Format: Electronic Resources<br/>Emerging Directions in Embedded and Ubiquitous Computing EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130092024-06-18T00:11:25Z2024-06-18T00:11:25Zby Denko, Mieso K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77090-9">http://dx.doi.org/10.1007/978-3-540-77090-9</a><br/>Format: Electronic Resources<br/>Embedded and Ubiquitous Computing International Conference, EUC 2007, Taipei, Taiwan, December 17-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130102024-06-18T00:11:25Z2024-06-18T00:11:25Zby Kuo, Tei-Wei. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77092-3">http://dx.doi.org/10.1007/978-3-540-77092-3</a><br/>Format: Electronic Resources<br/>Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130172024-06-18T00:11:25Z2024-06-18T00:11:25Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77156-2">http://dx.doi.org/10.1007/978-3-540-77156-2</a><br/>Format: Electronic Resources<br/>Dependable and Adaptable Networks and Services 13th Open European Summer School and IFIP TC6.6 Workshop, EUNICE 2007, Enschede, The Netherlands, July 18-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126862024-06-18T00:11:25Z2024-06-18T00:11:25Zby Pras, Aiko. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73530-4">http://dx.doi.org/10.1007/978-3-540-73530-4</a><br/>Format: Electronic Resources<br/>Pervasive Computing 5th International Conference, PERVASIVE 2007, Toronto, Canada, May 13-16, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124302024-06-18T00:11:25Z2024-06-18T00:11:25Zby LaMarca, Anthony. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72037-9">http://dx.doi.org/10.1007/978-3-540-72037-9</a><br/>Format: Electronic Resources<br/>Tests and Proofs First International Conference, TAP 2007, Zurich, Switzerland, February 12-13, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5127202024-06-18T00:11:25Z2024-06-18T00:11:25Zby Gurevich, Yuri. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73770-4">http://dx.doi.org/10.1007/978-3-540-73770-4</a><br/>Format: Electronic Resources<br/>Public Key Cryptography – PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5123812024-06-18T00:11:25Z2024-06-18T00:11:25Zby Okamoto, Tatsuaki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format: Electronic Resources<br/>Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papersent://SD_ILS/0/SD_ILS:5127562024-06-18T00:11:25Z2024-06-18T00:11:25Zby Camenisch, Jan L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127612024-06-18T00:11:25Z2024-06-18T00:11:25Zby Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127772024-06-18T00:11:25Z2024-06-18T00:11:25Zby Kruegel, Christopher. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74320-0">http://dx.doi.org/10.1007/978-3-540-74320-0</a><br/>Format: Electronic Resources<br/>Groupware: Design, Implementation, and Use 13th International Workshop, CRIWG 2007, Bariloche, Argentina, September 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128382024-06-18T00:11:25Z2024-06-18T00:11:25Zby Haake, Jörg M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74812-0">http://dx.doi.org/10.1007/978-3-540-74812-0</a><br/>Format: Electronic Resources<br/>Electronic Government 6th International Conference, EGOV 2007, Regensburg, Germany, September 3-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127882024-06-18T00:11:25Z2024-06-18T00:11:25Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74444-3">http://dx.doi.org/10.1007/978-3-540-74444-3</a><br/>Format: Electronic Resources<br/>Ad-Hoc, Mobile, and Wireless Networks 6th International Conference, ADHOC-NOW 2007, Morelia, Mexico, September 24-26, 2007, Proceeedingsent://SD_ILS/0/SD_ILS:5128412024-06-18T00:11:25Z2024-06-18T00:11:25Zby Kranakis, Evangelos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74823-6">http://dx.doi.org/10.1007/978-3-540-74823-6</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125292024-06-18T00:11:25Z2024-06-18T00:11:25Zby Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format: Electronic Resources<br/>Managing Next Generation Networks and Services 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Sapporo, Japan, October 10-12, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129092024-06-18T00:11:25Z2024-06-18T00:11:25Zby Ata, Shingo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75476-3">http://dx.doi.org/10.1007/978-3-540-75476-3</a><br/>Format: Electronic Resources<br/>Ubiquitous Intelligence and Computing 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126912024-06-18T00:11:25Z2024-06-18T00:11:25Zby Indulska, Jadwiga. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73549-6">http://dx.doi.org/10.1007/978-3-540-73549-6</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129912024-06-18T00:11:25Z2024-06-18T00:11:25Zby Bao, Feng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76969-9">http://dx.doi.org/10.1007/978-3-540-76969-9</a><br/>Format: Electronic Resources<br/>From Web to Social Web: Discovering and Deploying User and Content Profiles Workshop on Web Mining, WebMine 2006, Berlin, Germany, September 18, 2006. Revised Selected and Invited Papersent://SD_ILS/0/SD_ILS:5128582024-06-18T00:11:25Z2024-06-18T00:11:25Zby Berendt, Bettina. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74951-6">http://dx.doi.org/10.1007/978-3-540-74951-6</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing ICSOC 2006 4th International Conference, Chicago, IL, USA, December 4-7, 2006, Workshops Proceedingsent://SD_ILS/0/SD_ILS:5129112024-06-18T00:11:25Z2024-06-18T00:11:25Zby Georgakopoulos, Dimitrios. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75492-3">http://dx.doi.org/10.1007/978-3-540-75492-3</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papersent://SD_ILS/0/SD_ILS:5130332024-06-18T00:11:25Z2024-06-18T00:11:25Zby Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format: Electronic Resources<br/>Advances in Web Mining and Web Usage Analysis 8th International Workshop on Knowledge Discovery on the Web, WebKDD 2006 Philadelphia, USA, August 20, 2006 Revised Papersent://SD_ILS/0/SD_ILS:5130392024-06-18T00:11:25Z2024-06-18T00:11:25Zby Nasraoui, Olfa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77485-3">http://dx.doi.org/10.1007/978-3-540-77485-3</a><br/>Format: Electronic Resources<br/>E-Voting and Identity First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130402024-06-18T00:11:25Z2024-06-18T00:11:25Zby Alkassar, Ammar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77493-8">http://dx.doi.org/10.1007/978-3-540-77493-8</a><br/>Format: Electronic Resources<br/>Software Architectures, Components, and Applications Third International Conference on Quality of Software Architectures, QoSA 2007, Medford, MA, USA, July 11-23, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130452024-06-18T00:11:25Z2024-06-18T00:11:25Zby Overhage, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77619-2">http://dx.doi.org/10.1007/978-3-540-77619-2</a><br/>Format: Electronic Resources<br/>Ambient Intelligence European Conference, AmI 2007, Darmstadt, Germany, November 7-10, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129662024-06-18T00:11:25Z2024-06-18T00:11:25Zby Schiele, Bernt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76652-0">http://dx.doi.org/10.1007/978-3-540-76652-0</a><br/>Format: Electronic Resources<br/>Ubiquitous Computing Systems 4th International Symposium, UCS 2007, Tokyo, Japan, November 25-28, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129712024-06-18T00:11:25Z2024-06-18T00:11:25Zby Ichikawa, Haruhisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76772-5">http://dx.doi.org/10.1007/978-3-540-76772-5</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5128882024-06-18T00:11:25Z2024-06-18T00:11:25Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">http://dx.doi.org/10.1007/978-3-540-75227-1</a><br/>Format: Electronic Resources<br/>Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130042024-06-18T00:11:25Z2024-06-18T00:11:25Zby Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics: Biosurveillance Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May 22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125042024-06-18T00:11:25Z2024-06-18T00:11:25Zby Zeng, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72608-1">http://dx.doi.org/10.1007/978-3-540-72608-1</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papersent://SD_ILS/0/SD_ILS:5129222024-06-18T00:11:25Z2024-06-18T00:11:25Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129272024-06-18T00:11:25Z2024-06-18T00:11:25Zby Miyaji, Atsuko. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format: Electronic Resources<br/>Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130352024-06-18T00:11:25Z2024-06-18T00:11:25Zby Furon, Teddy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77370-2">http://dx.doi.org/10.1007/978-3-540-77370-2</a><br/>Format: Electronic Resources<br/>Managing Virtualization of Networks and Services 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San José, CA, USA, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129332024-06-18T00:11:25Z2024-06-18T00:11:25Zby Clemm, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75694-1">http://dx.doi.org/10.1007/978-3-540-75694-1</a><br/>Format: Electronic Resources<br/>Pervasive Computing for Quality of Life Enhancement 5th International Conference On Smart Homes and Health Telematics, ICOST 2007, Nara, Japan, June 21-23, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125822024-06-18T00:11:25Z2024-06-18T00:11:25Zby Okadome, Takeshi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73035-4">http://dx.doi.org/10.1007/978-3-540-73035-4</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127842024-06-18T00:11:25Z2024-06-18T00:11:25Zby Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5127032024-06-18T00:11:25Z2024-06-18T00:11:25Zby Hämmerli, Bernhard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128462024-06-18T00:11:25Z2024-06-18T00:11:25Zby Biskup, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format: Electronic Resources<br/>UbiComp 2007: Ubiquitous Computing 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128492024-06-18T00:11:25Z2024-06-18T00:11:25Zby Krumm, John. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74853-3">http://dx.doi.org/10.1007/978-3-540-74853-3</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing – ICSOC 2007 Fifth International Conference, Vienna, Austria, September 17-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128642024-06-18T00:11:25Z2024-06-18T00:11:25Zby Krämer, Bernd J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74974-5">http://dx.doi.org/10.1007/978-3-540-74974-5</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124602024-06-18T00:11:25Z2024-06-18T00:11:25Zby Sauveron, Damien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format: Electronic Resources<br/>Online Communities and Social Computing Second International Conference, OCSC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126232024-06-18T00:11:25Z2024-06-18T00:11:25Zby Schuler, Douglas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73257-0">http://dx.doi.org/10.1007/978-3-540-73257-0</a><br/>Format: Electronic Resources<br/>Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets AAMAS 2006 Workshop, TADA/AMEC 2006, Hakodate, Japan, May 9, 2006, Selected and Revised Papersent://SD_ILS/0/SD_ILS:5124822024-06-18T00:11:25Z2024-06-18T00:11:25Zby Fasli, Maria. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72502-2">http://dx.doi.org/10.1007/978-3-540-72502-2</a><br/>Format: Electronic Resources<br/>Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130072024-06-18T00:11:25Z2024-06-18T00:11:25Zby McDaniel, Patrick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format: Electronic Resources<br/>Engineering Self-Organising Systems 4th International Workshop, ESOA 2006, Hakodate, Japan, May 9, 2006, Revised and Invited Papersent://SD_ILS/0/SD_ILS:5121952024-06-18T00:11:25Z2024-06-18T00:11:25Zby Brueckner, Sven A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69868-5">http://dx.doi.org/10.1007/978-3-540-69868-5</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust Thrid International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5107202024-06-18T00:11:25Z2024-06-18T00:11:25Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/11679219">http://dx.doi.org/10.1007/11679219</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5109182024-06-18T00:11:25Z2024-06-18T00:11:25Zby Chen, Hsinchun. editor.<br/><a href="http://dx.doi.org/10.1007/11734628">http://dx.doi.org/10.1007/11734628</a><br/>Format: Electronic Resources<br/>Security in Pervasive Computing Third International Conference, SPC 2006, York, UK, April 18-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5109202024-06-18T00:11:25Z2024-06-18T00:11:25Zby Clark, John A. editor.<br/><a href="http://dx.doi.org/10.1007/11734666">http://dx.doi.org/10.1007/11734666</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5112082024-06-18T00:11:25Z2024-06-18T00:11:25Zby Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11767831">http://dx.doi.org/10.1007/11767831</a><br/>Format: Electronic Resources<br/>Innovative Internet Community Systems 4th International Workshop, IICS 2004, Guadalajara, Mexico, June 21-23, 2004. Revised Papersent://SD_ILS/0/SD_ILS:5110312024-06-18T00:11:25Z2024-06-18T00:11:25Zby Böhme, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/11553762">http://dx.doi.org/10.1007/11553762</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111372024-06-18T00:11:25Z2024-06-18T00:11:25Zby Mehrotra, Sharad. editor.<br/><a href="http://dx.doi.org/10.1007/11760146">http://dx.doi.org/10.1007/11760146</a><br/>Format: Electronic Resources<br/>Security Protocols 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5116632024-06-18T00:11:25Z2024-06-18T00:11:25Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11861386">http://dx.doi.org/10.1007/11861386</a><br/>Format: Electronic Resources<br/>Advances in Web Mining and Web Usage Analysis 7th International Workshop on Knowledge Discovery on the Web, WebKDD 2005, Chicago, IL, USA, August 21, 2005. Revised Papersent://SD_ILS/0/SD_ILS:5117872024-06-18T00:11:25Z2024-06-18T00:11:25Zby Nasraoui, Olfa. editor.<br/><a href="http://dx.doi.org/10.1007/11891321">http://dx.doi.org/10.1007/11891321</a><br/>Format: Electronic Resources<br/>Advances in Web Mining and Web Usage Analysis 6th International Workshop on Knowledge Discovery on the Web, WebKDD 2004, Seattle, WA, USA, August 22-25, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5118292024-06-18T00:11:25Z2024-06-18T00:11:25Zby Mobasher, Bamshad. editor.<br/><a href="http://dx.doi.org/10.1007/11899402">http://dx.doi.org/10.1007/11899402</a><br/>Format: Electronic Resources<br/>Pervasive Computing 4th International Conference, PERVASIVE 2006, Dublin, Ireland, May 7-10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5110142024-06-18T00:11:25Z2024-06-18T00:11:25Zby Fishkin, Kenneth P. editor.<br/><a href="http://dx.doi.org/10.1007/11748625">http://dx.doi.org/10.1007/11748625</a><br/>Format: Electronic Resources<br/>Advances in Database Technology - EDBT 2006 10th International Conference on Extending Database Technology, Munich, Germany, March 26-31, 2006ent://SD_ILS/0/SD_ILS:5108032024-06-18T00:11:25Z2024-06-18T00:11:25Zby Ioannidis, Yannis. editor.<br/><a href="http://dx.doi.org/10.1007/11687238">http://dx.doi.org/10.1007/11687238</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware & Vulnerability Assessment Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5113452024-06-18T00:11:25Z2024-06-18T00:11:25Zby Büschkes, Roland. editor.<br/><a href="http://dx.doi.org/10.1007/11790754">http://dx.doi.org/10.1007/11790754</a><br/>Format: Electronic Resources<br/>Groupware: Design, Implementation, and Use 12th International Workshop, CRIWG 2006, Medina del Campo, Spain, September 17-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116452024-06-18T00:11:25Z2024-06-18T00:11:25Zby Dimitriadis, Yannis A. editor.<br/><a href="http://dx.doi.org/10.1007/11853862">http://dx.doi.org/10.1007/11853862</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111992024-06-18T00:11:25Z2024-06-18T00:11:25Zby Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11767480">http://dx.doi.org/10.1007/11767480</a><br/>Format: Electronic Resources<br/>Ad-Hoc, Mobile, and Wireless Networks 5th International Conference, ADHOC-NOW 2006, Ottawa, Canada, August 17-19, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5114722024-06-18T00:11:25Z2024-06-18T00:11:25Zby Kunz, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/11814764">http://dx.doi.org/10.1007/11814764</a><br/>Format: Electronic Resources<br/>Electronic Government 5th International Conference, EGOV 2006, Kraków, Poland, September 4-8, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115442024-06-18T00:11:25Z2024-06-18T00:11:25Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/11823100">http://dx.doi.org/10.1007/11823100</a><br/>Format: Electronic Resources<br/>Trust Management 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5110902024-06-18T00:11:25Z2024-06-18T00:11:25Zby Stølen, Ketil. editor.<br/><a href="http://dx.doi.org/10.1007/11755593">http://dx.doi.org/10.1007/11755593</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5121072024-06-18T00:11:25Z2024-06-18T00:11:25Zby Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11957454">http://dx.doi.org/10.1007/11957454</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papersent://SD_ILS/0/SD_ILS:5121352024-06-18T00:11:25Z2024-06-18T00:11:25Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/11962977">http://dx.doi.org/10.1007/11962977</a><br/>Format: Electronic Resources<br/>Trust and Privacy in Digital Business Third International Conference, TrustBus 2006, Kraków, Poland, September 4-8, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115662024-06-18T00:11:25Z2024-06-18T00:11:25Zby Fischer-Hübner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/11824633">http://dx.doi.org/10.1007/11824633</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118522024-06-18T00:11:25Z2024-06-18T00:11:25Zby Yoshiura, Hiroshi. editor.<br/><a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116812024-06-18T00:11:25Z2024-06-18T00:11:25Zby Gollmann, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/11863908">http://dx.doi.org/10.1007/11863908</a><br/>Format: Electronic Resources<br/>Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms AAMAS 2005 Workshop, AMEC 2005, Utrecht, Netherlands, July 25, 2005, and IJCAI 2005 Workshop, TADA 2005, Edinburgh, UK, August 1, 2005, Selected and Revised Papersent://SD_ILS/0/SD_ILS:5117672024-06-18T00:11:25Z2024-06-18T00:11:25Zby Poutré, Han. editor.<br/><a href="http://dx.doi.org/10.1007/11888727">http://dx.doi.org/10.1007/11888727</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - CRYPTO 2006 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5114992024-06-18T00:11:25Z2024-06-18T00:11:25Zby Dwork, Cynthia. editor.<br/><a href="http://dx.doi.org/10.1007/11818175">http://dx.doi.org/10.1007/11818175</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119612024-06-18T00:11:25Z2024-06-18T00:11:25Zby Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/11935070">http://dx.doi.org/10.1007/11935070</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119832024-06-18T00:11:25Z2024-06-18T00:11:25Zby Lipmaa, Helger. editor.<br/><a href="http://dx.doi.org/10.1007/11937807">http://dx.doi.org/10.1007/11937807</a><br/>Format: Electronic Resources<br/>Management of Convergence Networks and Services 9th Asia-Pacific Network Operations and Management Symposium, APNOMS 2006 Busan, Korea, September 27-29, 2006 Proceedingsent://SD_ILS/0/SD_ILS:5117612024-06-18T00:11:25Z2024-06-18T00:11:25Zby Kim, Young-Tak. editor.<br/><a href="http://dx.doi.org/10.1007/11876601">http://dx.doi.org/10.1007/11876601</a><br/>Format: Electronic Resources<br/>Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5117712024-06-18T00:11:25Z2024-06-18T00:11:25Zby Breveglieri, Luca. editor.<br/><a href="http://dx.doi.org/10.1007/11889700">http://dx.doi.org/10.1007/11889700</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:5117732024-06-18T00:11:25Z2024-06-18T00:11:25Zby Crescenzo, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/11889663">http://dx.doi.org/10.1007/11889663</a><br/>Format: Electronic Resources<br/>Ubiquitous Computing Systems Third International Symposium, UCS 2006, Seoul, Korea, October 11-13, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5117792024-06-18T00:11:25Z2024-06-18T00:11:25Zby Youn, Hee Yong. editor.<br/><a href="http://dx.doi.org/10.1007/11890348">http://dx.doi.org/10.1007/11890348</a><br/>Format: Electronic Resources<br/>Embedded and Ubiquitous Computing International Conference, EUC 2006, Seoul, Korea, August 1-4, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5113982024-06-18T00:11:25Z2024-06-18T00:11:25Zby Sha, Edwin. editor.<br/><a href="http://dx.doi.org/10.1007/11802167">http://dx.doi.org/10.1007/11802167</a><br/>Format: Electronic Resources<br/>Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119672024-06-18T00:11:25Z2024-06-18T00:11:25Zby Ning, Peng. editor.<br/><a href="http://dx.doi.org/10.1007/11935308">http://dx.doi.org/10.1007/11935308</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115862024-06-18T00:11:25Z2024-06-18T00:11:25Zby Prisco, Roberto. editor.<br/><a href="http://dx.doi.org/10.1007/11832072">http://dx.doi.org/10.1007/11832072</a><br/>Format: Electronic Resources<br/>Ubiquitous Intelligence and Computing Third International Conference, UIC 2006, Wuhan, China, September 3-6, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115892024-06-18T00:11:25Z2024-06-18T00:11:25Zby Ma, Jianhua. editor.<br/><a href="http://dx.doi.org/10.1007/11833529">http://dx.doi.org/10.1007/11833529</a><br/>Format: Electronic Resources<br/>Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5121252024-06-18T00:11:25Z2024-06-18T00:11:25Zby Bagchi, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format: Electronic Resources<br/>Agents and Peer-to-Peer Computing 4th International Workshop, AP2PC 2005, Utrecht, The Netherlands, July 25, 2005. Revised Papersent://SD_ILS/0/SD_ILS:5121262024-06-18T00:11:25Z2024-06-18T00:11:25Zby Despotovic, Zoran. editor.<br/><a href="http://dx.doi.org/10.1007/11925941">http://dx.doi.org/10.1007/11925941</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing – ICSOC 2006 4th International Conference, Chicago, IL, USA, December 4-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5120562024-06-18T00:11:25Z2024-06-18T00:11:25Zby Dan, Asit. editor.<br/><a href="http://dx.doi.org/10.1007/11948148">http://dx.doi.org/10.1007/11948148</a><br/>Format: Electronic Resources<br/>Large Scale Management of Distributed Systems 17th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2006, Dublin, Ireland, October 23-25, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118472024-06-18T00:11:25Z2024-06-18T00:11:25Zby State, Radu. editor.<br/><a href="http://dx.doi.org/10.1007/11907466">http://dx.doi.org/10.1007/11907466</a><br/>Format: Electronic Resources<br/>Semantics, Web and Mining Joint International Workshops, EWMF 2005 and KDO 2005, Porto, Portugal, October 3-7, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5118512024-06-18T00:11:25Z2024-06-18T00:11:25Zby Ackermann, Markus. editor.<br/><a href="http://dx.doi.org/10.1007/11908678">http://dx.doi.org/10.1007/11908678</a><br/>Format: Electronic Resources<br/>Engineering Self-Organising Systems Third International Workshop, ESOA 2005, Utrecht, The Netherlands, July 25, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5109152024-06-18T00:11:25Z2024-06-18T00:11:25Zby Brueckner, Sven A. editor.<br/><a href="http://dx.doi.org/10.1007/11734697">http://dx.doi.org/10.1007/11734697</a><br/>Format: Electronic Resources<br/>Technologies for E-Services 6th International Workshop, TES 2005, Trondheim, Norway, September 2-3, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5107862024-06-18T00:11:25Z2024-06-18T00:11:25Zby Bussler, Christoph. editor.<br/><a href="http://dx.doi.org/10.1007/11607380">http://dx.doi.org/10.1007/11607380</a><br/>Format: Electronic Resources<br/>Digital Rights Management. Technologies, Issues, Challenges and Systems First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5113422024-06-18T00:11:25Z2024-06-18T00:11:25Zby Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/11787952">http://dx.doi.org/10.1007/11787952</a><br/>Format: Electronic Resources<br/>UbiComp 2006: Ubiquitous Computing 8th International Conference, UbiComp 2006 Orange County, CA, USA, September 17-21, 2006 Proceedingsent://SD_ILS/0/SD_ILS:5116502024-06-18T00:11:25Z2024-06-18T00:11:25Zby Dourish, Paul. editor.<br/><a href="http://dx.doi.org/10.1007/11853565">http://dx.doi.org/10.1007/11853565</a><br/>Format: Electronic Resources<br/>Quality of Software Architectures Second International Conference on Quality of Software Architectures, QoSA 2006, Västerås, Sweden, June 27-29, 2006 Revised Papersent://SD_ILS/0/SD_ILS:5119132024-06-18T00:11:25Z2024-06-18T00:11:25Zby Hofmeister, Christine. editor.<br/><a href="http://dx.doi.org/10.1007/11921998">http://dx.doi.org/10.1007/11921998</a><br/>Format: Electronic Resources<br/>Emerging Directions in Embedded and Ubiquitous Computing EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5114342024-06-18T00:11:25Z2024-06-18T00:11:25Zby Zhou, Xiaobo. editor.<br/><a href="http://dx.doi.org/10.1007/11807964">http://dx.doi.org/10.1007/11807964</a><br/>Format: Electronic Resources<br/>Web Services and Formal Methods Third International Workshop, WS-FM 2006 Vienna, Austria, September 8-9, 2006 Proceedingsent://SD_ILS/0/SD_ILS:5116162024-06-18T00:11:25Z2024-06-18T00:11:25Zby Bravetti, Mario. editor.<br/><a href="http://dx.doi.org/10.1007/11841197">http://dx.doi.org/10.1007/11841197</a><br/>Format: Electronic Resources<br/>Advanced Web and Network Technologies, and Applications APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Harbin, China, January 16-18, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5106602024-06-18T00:11:25Z2024-06-18T00:11:25Zby Shen, Heng Tao. editor.<br/><a href="http://dx.doi.org/10.1007/11610496">http://dx.doi.org/10.1007/11610496</a><br/>Format: Electronic Resources<br/>Frontiers of WWW Research and Development - APWeb 2006 8th Asia-Pacific Web Conference, Harbin, China, January 16-18, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5106622024-06-18T00:11:25Z2024-06-18T00:11:25Zby Zhou, Xiaofang. editor.<br/><a href="http://dx.doi.org/10.1007/11610113">http://dx.doi.org/10.1007/11610113</a><br/>Format: Electronic Resources<br/>Emerging Trends in Information and Communication Security International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111822024-06-18T00:11:25Z2024-06-18T00:11:25Zby Müller, Günter. editor.<br/><a href="http://dx.doi.org/10.1007/11766155">http://dx.doi.org/10.1007/11766155</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005. Revised Papersent://SD_ILS/0/SD_ILS:5101792024-06-18T00:11:25Z2024-06-18T00:11:25Zby Valdes, Alfonso. editor.<br/><a href="http://dx.doi.org/10.1007/11663812">http://dx.doi.org/10.1007/11663812</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5109082024-06-18T00:11:25Z2024-06-18T00:11:25Zby Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/11733447">http://dx.doi.org/10.1007/11733447</a><br/>Format: Electronic Resources<br/>Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5110072024-06-18T00:11:25Z2024-06-18T00:11:25Zby Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/11745853">http://dx.doi.org/10.1007/11745853</a><br/>Format: Electronic Resources<br/>Innovative Internet Community Systems 5th International Workshop, IICS 2005, Paris, France, June 20-22, 2005. Revised Papersent://SD_ILS/0/SD_ILS:5110222024-06-18T00:11:25Z2024-06-18T00:11:25Zby Bui, Alain. editor.<br/><a href="http://dx.doi.org/10.1007/11749776">http://dx.doi.org/10.1007/11749776</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5108252024-06-18T00:11:25Z2024-06-18T00:11:25Zby Chen, Kefei. editor.<br/><a href="http://dx.doi.org/10.1007/11689522">http://dx.doi.org/10.1007/11689522</a><br/>Format: Electronic Resources<br/>Trends in Enterprise Application Architecture VLDB Workshop, TEAA 2005, Trondheim, Norway, August 28, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5107502024-06-18T00:11:25Z2024-06-18T00:11:25Zby Draheim, Dirk. editor.<br/><a href="http://dx.doi.org/10.1007/11681885">http://dx.doi.org/10.1007/11681885</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 9th International Symposium, RAID 2006 Hamburg, Germany, September 20-22, 2006 Proceedingsent://SD_ILS/0/SD_ILS:5116522024-06-18T00:11:25Z2024-06-18T00:11:25Zby Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/11856214">http://dx.doi.org/10.1007/11856214</a><br/>Format: Electronic Resources<br/>Object-Oriented Technology. ECOOP 2004 Workshop Reader ECOOP 2004 Workshops, Oslo, Norway, June 14-18, 2004, Final Reportsent://SD_ILS/0/SD_ILS:5097362024-06-18T00:11:25Z2024-06-18T00:11:25Zby Malenfant, Jacques. editor.<br/><a href="http://dx.doi.org/10.1007/b104146">http://dx.doi.org/10.1007/b104146</a><br/>Format: Electronic Resources<br/>Agents and Peer-to-Peer Computing Third International Workshop, AP2PC 2004, New York, NY, USA, July 19, 2004, Revised and Invited Papersent://SD_ILS/0/SD_ILS:5101122024-06-18T00:11:25Z2024-06-18T00:11:25Zby Moro, Gianluca. editor.<br/><a href="http://dx.doi.org/10.1007/11574781">http://dx.doi.org/10.1007/11574781</a><br/>Format: Electronic Resources<br/>UbiComp 2005: Ubiquitous Computing 7th International Conference, UbiComp 2005, Tokyo, Japan, September 11-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103132024-06-18T00:11:25Z2024-06-18T00:11:25Zby Beigl, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/11551201">http://dx.doi.org/10.1007/11551201</a><br/>Format: Electronic Resources<br/>Current Trends in Database Technology - EDBT 2004 Workshops EDBT 2004 Workshops PhD, DataX, PIM, P2P&DB, and ClustWeb, Heraklion, Crete, Greece, March 14-18, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5096792024-06-18T00:11:25Z2024-06-18T00:11:25Zby Lindner, Wolfgang. editor.<br/><a href="http://dx.doi.org/10.1007/b101218">http://dx.doi.org/10.1007/b101218</a><br/>Format: Electronic Resources<br/>Electronic Government 4th International Conference, EGOV 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101632024-06-18T00:11:25Z2024-06-18T00:11:25Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/11545156">http://dx.doi.org/10.1007/11545156</a><br/>Format: Electronic Resources<br/>Networking - ICN 2005 4th International Conference on Networking, Reunion Island, France, April 17-21, 2005, Proceedings, Part Ient://SD_ILS/0/SD_ILS:5103272024-06-18T00:11:25Z2024-06-18T00:11:25Zby Lorenz, Pascal. editor.<br/><a href="http://dx.doi.org/10.1007/b107117">http://dx.doi.org/10.1007/b107117</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5103312024-06-18T00:11:25Z2024-06-18T00:11:25Zby Martin, David. editor.<br/><a href="http://dx.doi.org/10.1007/b136164">http://dx.doi.org/10.1007/b136164</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103492024-06-18T00:11:25Z2024-06-18T00:11:25Zby Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format: Electronic Resources<br/>Audio- and Video-Based Biometric Person Authentication 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5100992024-06-18T00:11:25Z2024-06-18T00:11:25Zby Kanade, Takeo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-31638-1">http://dx.doi.org/10.1007/978-3-540-31638-1</a><br/>Format: Electronic Resources<br/>Trusting Agents for Trusting Electronic Societies Theory and Applications in HCI and E-Commerceent://SD_ILS/0/SD_ILS:5102422024-06-18T00:11:25Z2024-06-18T00:11:25Zby Falcone, Rino. editor.<br/><a href="http://dx.doi.org/10.1007/11532095">http://dx.doi.org/10.1007/11532095</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103512024-06-18T00:11:25Z2024-06-18T00:11:25Zby Vimercati, Sabrina de Capitani. editor.<br/><a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format: Electronic Resources<br/>Web and Communication Technologies and Internet-Related Social Issues - HSI 2005 3rd International Conference on Human.Society@Internet, Tokyo, Japan, July 27-29, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101922024-06-18T00:11:25Z2024-06-18T00:11:25Zby Shimojo, Shinji. editor.<br/><a href="http://dx.doi.org/10.1007/11527725">http://dx.doi.org/10.1007/11527725</a><br/>Format: Electronic Resources<br/>Ubiquitous Computing Systems Second International Symposium, UCS 2004, Tokyo, Japan, November 8-9, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5101932024-06-18T00:11:25Z2024-06-18T00:11:25Zby Murakami, Hitomi. editor.<br/><a href="http://dx.doi.org/10.1007/11526858">http://dx.doi.org/10.1007/11526858</a><br/>Format: Electronic Resources<br/>Groupware: Design, Implementation, and Use 11th International Workshop, CRIWG 2005, Porto de Galinhas, Brazil, September 25-29, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103682024-06-18T00:11:25Z2024-06-18T00:11:25Zby Fukś, Hugo. editor.<br/><a href="http://dx.doi.org/10.1007/11560296">http://dx.doi.org/10.1007/11560296</a><br/>Format: Electronic Resources<br/>Security in Pervasive Computing Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103702024-06-18T00:11:25Z2024-06-18T00:11:25Zby Hutter, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/b135497">http://dx.doi.org/10.1007/b135497</a><br/>Format: Electronic Resources<br/>Pervasive Computing Third International Conference, PERVASIVE 2005, Munich, Germany, May 8-13, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103972024-06-18T00:11:25Z2024-06-18T00:11:25Zby Gellersen, Hans -W. editor.<br/><a href="http://dx.doi.org/10.1007/b136550">http://dx.doi.org/10.1007/b136550</a><br/>Format: Electronic Resources<br/>Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103022024-06-18T00:11:25Z2024-06-18T00:11:25Zby Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format: Electronic Resources<br/>Ambient Networks 16th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2005, Barcelona, Spain, October 24-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105202024-06-18T00:11:25Z2024-06-18T00:11:25Zby Schönwälder, Jürgen. editor.<br/><a href="http://dx.doi.org/10.1007/11568285">http://dx.doi.org/10.1007/11568285</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105722024-06-18T00:11:25Z2024-06-18T00:11:25Zby Desmedt, Yvo G. editor.<br/><a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format: Electronic Resources<br/>Digital Cities III. Information Technologies for Social Capital: Cross-cultural Perspectives Third International Digital Cities Workshop, Amsterdam, The Netherlands, September 18-19, 2003. Revised Selected Papersent://SD_ILS/0/SD_ILS:5088332024-06-18T00:11:25Z2024-06-18T00:11:25Zby Besselaar, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/b107136">http://dx.doi.org/10.1007/b107136</a><br/>Format: Electronic Resources<br/>Networking - ICN 2005 4th International Conference on Networking, Reunion Island, France, April 17-21, 2005, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5103282024-06-18T00:11:25Z2024-06-18T00:11:25Zby Lorenz, Pascal. editor.<br/><a href="http://dx.doi.org/10.1007/b107118">http://dx.doi.org/10.1007/b107118</a><br/>Format: Electronic Resources<br/>Ad-Hoc, Mobile, and Wireless Networks 4th International Conference, ADHOC-NOW 2005, Cancun, Mexico, October 6-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104462024-06-18T00:11:25Z2024-06-18T00:11:25Zby Syrotiuk, Violet R. editor.<br/><a href="http://dx.doi.org/10.1007/11561354">http://dx.doi.org/10.1007/11561354</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 – 21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103482024-06-18T00:11:25Z2024-06-18T00:11:25Zby Dittmann, Jana. editor.<br/><a href="http://dx.doi.org/10.1007/11552055">http://dx.doi.org/10.1007/11552055</a><br/>Format: Electronic Resources<br/>Technologies for E-Services 5th International Workshop, TES 2004, Toronto, Canada, August 29-30, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5101952024-06-18T00:11:25Z2024-06-18T00:11:25Zby Shan, Ming-Chien. editor.<br/><a href="http://dx.doi.org/10.1007/b106626">http://dx.doi.org/10.1007/b106626</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101032024-06-18T00:11:25Z2024-06-18T00:11:25Zby Julisch, Klaus. editor.<br/><a href="http://dx.doi.org/10.1007/b137798">http://dx.doi.org/10.1007/b137798</a><br/>Format: Electronic Resources<br/>Trust Management Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104032024-06-18T00:11:25Z2024-06-18T00:11:25Zby Herrmann, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/b136639">http://dx.doi.org/10.1007/b136639</a><br/>Format: Electronic Resources<br/>Intelligent Techniques for Web Personalization IJCAI 2003 Workshop, ITWP 2003, Acapulco, Mexico, August 11, 2003, Revised Selected Papersent://SD_ILS/0/SD_ILS:5101112024-06-18T00:11:25Z2024-06-18T00:11:25Zby Mobasher, Bamshad. editor.<br/><a href="http://dx.doi.org/10.1007/11577935">http://dx.doi.org/10.1007/11577935</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 – March 3, 2005. Revised Papersent://SD_ILS/0/SD_ILS:5101322024-06-18T00:11:25Z2024-06-18T00:11:25Zby Patrick, Andrew S. editor.<br/><a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format: Electronic Resources<br/>Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5097572024-06-18T00:11:25Z2024-06-18T00:11:25Zby Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format: Electronic Resources<br/>Quality of Software Architectures and Software Quality First International Conference on the Quality of Software Architectures, QoSA 2005, and Second International Workshop on Software Quality, SOQUA 2005, Erfurt, Germany, September 20-22, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104192024-06-18T00:11:25Z2024-06-18T00:11:25Zby Reussner, Ralf. editor.<br/><a href="http://dx.doi.org/10.1007/11558569">http://dx.doi.org/10.1007/11558569</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104242024-06-18T00:11:25Z2024-06-18T00:11:25Zby Kantor, Paul. editor.<br/><a href="http://dx.doi.org/10.1007/b136511">http://dx.doi.org/10.1007/b136511</a><br/>Format: Electronic Resources<br/>Universal Access in Health Telematics A Design Code of Practiceent://SD_ILS/0/SD_ILS:5101652024-06-18T00:11:25Z2024-06-18T00:11:25Zby Stephanidis, Constantine. editor.<br/><a href="http://dx.doi.org/10.1007/b136257">http://dx.doi.org/10.1007/b136257</a><br/>Format: Electronic Resources<br/>Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104592024-06-18T00:11:25Z2024-06-18T00:11:25Zby Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format: Electronic Resources<br/>Networking and Mobile Computing Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5102512024-06-18T00:11:25Z2024-06-18T00:11:25Zby Lu, Xicheng. editor.<br/><a href="http://dx.doi.org/10.1007/11534310">http://dx.doi.org/10.1007/11534310</a><br/>Format: Electronic Resources<br/>Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5106482024-06-18T00:11:25Z2024-06-18T00:11:25Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5106502024-06-18T00:11:25Z2024-06-18T00:11:25Zby Feng, Dengguo. editor.<br/><a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format: Electronic Resources<br/>Information Hiding 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5096712024-06-18T00:11:25Z2024-06-18T00:11:25Zby Fridrich, Jessica. editor.<br/><a href="http://dx.doi.org/10.1007/b104759">http://dx.doi.org/10.1007/b104759</a><br/>Format: Electronic Resources<br/>Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5097702024-06-18T00:11:25Z2024-06-18T00:11:25Zby Blundo, Carlo. editor.<br/><a href="http://dx.doi.org/10.1007/b105083">http://dx.doi.org/10.1007/b105083</a><br/>Format: Electronic Resources<br/>Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papersent://SD_ILS/0/SD_ILS:5102192024-06-18T00:11:25Z2024-06-18T00:11:25Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing - ICSOC 2005 Third International Conference, Amsterdam, The Netherlands, December 12-15, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105682024-06-18T00:11:25Z2024-06-18T00:11:25Zby Benatallah, Boualem. editor.<br/><a href="http://dx.doi.org/10.1007/11596141">http://dx.doi.org/10.1007/11596141</a><br/>Format: Electronic Resources<br/>Embedded and Ubiquitous Computing – EUC 2005 International Conference EUC 2005, Nagasaki, Japan, December 6-9, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105692024-06-18T00:11:25Z2024-06-18T00:11:25Zby Yang, Laurence T. editor.<br/><a href="http://dx.doi.org/10.1007/11596356">http://dx.doi.org/10.1007/11596356</a><br/>Format: Electronic Resources<br/>Embedded and Ubiquitous Computing – EUC 2005 Workshops EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105702024-06-18T00:11:25Z2024-06-18T00:11:25Zby Enokido, Tomoya. editor.<br/><a href="http://dx.doi.org/10.1007/11596042">http://dx.doi.org/10.1007/11596042</a><br/>Format: Electronic Resources<br/>Information Hiding 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5099642024-06-18T00:11:25Z2024-06-18T00:11:25Zby Barni, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/11558859">http://dx.doi.org/10.1007/11558859</a><br/>Format: Electronic Resources<br/>Trust, Privacy, and Security in Digital Business Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101862024-06-18T00:11:25Z2024-06-18T00:11:25Zby Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/11537878">http://dx.doi.org/10.1007/11537878</a><br/>Format: Electronic Resources<br/>Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103642024-06-18T00:11:25Z2024-06-18T00:11:25Zby Gorodetsky, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format: Electronic Resources<br/>Web Technologies Research and Development - APWeb 2005 7th Asia-Pacific Web Conference, Shanghai, China, March 29 - April 1, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5102322024-06-18T00:11:25Z2024-06-18T00:11:25Zby Zhang, Yanchun. editor.<br/><a href="http://dx.doi.org/10.1007/b106936">http://dx.doi.org/10.1007/b106936</a><br/>Format: Electronic Resources<br/>Agent-Mediated Electronic Commerce VI. Theories for and Engineering of Distributed Mechanisms and Systems AAMAS 2004 Workshop, AMEC 2004, New York, NY, USA, July 19, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5108562024-06-18T00:11:25Z2024-06-18T00:11:25Zby Faratin, Peyman. editor.<br/><a href="http://dx.doi.org/10.1007/11575726">http://dx.doi.org/10.1007/11575726</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2005 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5102532024-06-18T00:11:25Z2024-06-18T00:11:25Zby Shoup, Victor. editor.<br/><a href="http://dx.doi.org/10.1007/11535218">http://dx.doi.org/10.1007/11535218</a><br/>Format: Electronic Resources<br/>Engineering Self-Organising Systems Methodologies and Applicationsent://SD_ILS/0/SD_ILS:5102842024-06-18T00:11:25Z2024-06-18T00:11:25Zby Brueckner, Sven A. editor.<br/><a href="http://dx.doi.org/10.1007/b136984">http://dx.doi.org/10.1007/b136984</a><br/>Format: Electronic Resources<br/>Formal Techniques for Computer Systems and Business Processes European Performance Engineering Workshop, EPEW 2005 and International Workshop on Web Services and Formal Methods, WS-FM 2005, Versailles, France, September 1-3, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5102862024-06-18T00:11:25Z2024-06-18T00:11:25Zby Bravetti, Mario. editor.<br/><a href="http://dx.doi.org/10.1007/11549970">http://dx.doi.org/10.1007/11549970</a><br/>Format: Electronic Resources<br/>