Search Results for - Narrowed by: Computers and Society. - Computer Communication Networks. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computers$002band$002bSociety.$002509Computers$002band$002bSociety.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026ps$003d300? 2024-05-25T21:56:01Z Smart Grid and Innovative Frontiers in Telecommunications Third International Conference, SmartGIFT 2018, Auckland, New Zealand, April 23-24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084930 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Chong, Peter Han Joo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94965-9">https://doi.org/10.1007/978-3-319-94965-9</a><br/>Format:&#160;Electronic Resources<br/> Innovation and Interdisciplinary Solutions for Underserved Areas First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11&ndash;12, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084890 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;M. F. Kebe, Cheikh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72965-7">https://doi.org/10.1007/978-3-319-72965-7</a><br/>Format:&#160;Electronic Resources<br/> Emerging Technologies for Developing Countries First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedings ent://SD_ILS/0/SD_ILS:2084718 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Belqasmi, Fatna. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67837-5">https://doi.org/10.1007/978-3-319-67837-5</a><br/>Format:&#160;Electronic Resources<br/> Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084720 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format:&#160;Electronic Resources<br/> Management Perspective for Transport Telematics 18th International Conference on Transport System Telematics, TST 2018, Krakow, Poland, March 20-23, 2018, Selected Papers ent://SD_ILS/0/SD_ILS:2084299 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Mikulski, Jerzy. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97955-7">https://doi.org/10.1007/978-3-319-97955-7</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5&ndash;6, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085499 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542<br/><a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085904 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2085623 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085299 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Bailey, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00470-5">https://doi.org/10.1007/978-3-030-00470-5</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085523 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format:&#160;Electronic Resources<br/> A Brief History of Everything Wireless How Invisible Waves Have Changed the World ent://SD_ILS/0/SD_ILS:2084632 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Launiainen, Petri. author.<br/><a href="https://doi.org/10.1007/978-3-319-78910-1">https://doi.org/10.1007/978-3-319-78910-1</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085464 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085538 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format:&#160;Electronic Resources<br/> Mobile Networks and Management 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084542 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Hu, Jiankun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-90775-8">https://doi.org/10.1007/978-3-319-90775-8</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Mobile Data Privacy ent://SD_ILS/0/SD_ILS:2084303 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Gkoulalas-Divanis, Aris. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format:&#160;Electronic Resources<br/> e-Infrastructure and e-Services for Developing Countries 8th International Conference, AFRICOMM 2016, Ouagadougou, Burkina Faso, December 6-7, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084791 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Bissyande, Tegawend&eacute; F. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66742-3">https://doi.org/10.1007/978-3-319-66742-3</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 17th International Conference, CANS 2018, Naples, Italy, September 30 &ndash; October 3, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085343 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Camenisch, Jan. editor. (orcid)0000-0001-6654-9459<br/><a href="https://doi.org/10.1007/978-3-030-00434-7">https://doi.org/10.1007/978-3-030-00434-7</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21&ndash;22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085253 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Dinur, Itai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format:&#160;Electronic Resources<br/> Engineering Multi-Agent Systems 5th International Workshop, EMAS 2017, Sao Paulo, Brazil, May 8-9, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085355 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;El Fallah-Seghrouchni, Amal. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91899-0">https://doi.org/10.1007/978-3-319-91899-0</a><br/>Format:&#160;Electronic Resources<br/> From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday ent://SD_ILS/0/SD_ILS:2085364 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620<br/><a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 19th International Conference, PAM 2018, Berlin, Germany, March 26&ndash;27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085848 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Beverly, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76481-8">https://doi.org/10.1007/978-3-319-76481-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2086040 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics XIV 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084238 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99277-8">https://doi.org/10.1007/978-3-319-99277-8</a><br/>Format:&#160;Electronic Resources<br/> Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085212 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085213 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Gruschka, Nils. editor. (orcid)0000-0001-7360-8314<br/><a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085576 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Negi, Atul. editor. (orcid)0000-0001-5707-130X<br/><a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085290 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format:&#160;Electronic Resources<br/> Mobility Analytics for Spatio-Temporal and Social Data First International Workshop, MATES 2017, Munich, Germany, September 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086020 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Doulkeridis, Christos. editor. (orcid)0000-0002-3219-0510<br/><a href="https://doi.org/10.1007/978-3-319-73521-4">https://doi.org/10.1007/978-3-319-73521-4</a><br/>Format:&#160;Electronic Resources<br/> Persuasive Technology 11th International Conference, PERSUASIVE 2016, Salzburg, Austria, April 5-7, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086036 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Meschtscherjakov, Alexander. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31510-2">https://doi.org/10.1007/978-3-319-31510-2</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2086063 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format:&#160;Electronic Resources<br/> Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084105 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format:&#160;Electronic Resources<br/> Ubiquitous Computing and Ambient Intelligence 10th International Conference, UCAmI 2016, San Bartolom&eacute; de Tirajana, Gran Canaria, Spain, November 29 &ndash; December 2, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085247 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Garc&iacute;a, Carmelo R. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48746-5">https://doi.org/10.1007/978-3-319-48746-5</a><br/>Format:&#160;Electronic Resources<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086126 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085729 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2&ndash;8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085744 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of IT for the Aged Population. Healthy and Active Aging Second International Conference, ITAP 2016, Held as Part of HCI International 2016 Toronto, ON, Canada, July 17&ndash;22, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085999 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39949-2">https://doi.org/10.1007/978-3-319-39949-2</a><br/>Format:&#160;Electronic Resources<br/> Ubiquitous Computing and Ambient Intelligence 10th International Conference, UCAmI 2016, San Bartolom&eacute; de Tirajana, Gran Canaria, Spain, November 29 &ndash; December 2, 2016, Part II ent://SD_ILS/0/SD_ILS:2085707 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Garc&iacute;a, Carmelo R. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48799-1">https://doi.org/10.1007/978-3-319-48799-1</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of IT for the Aged Population. Design for Aging Second International Conference, ITAP 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17&ndash;22, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085808 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39943-0">https://doi.org/10.1007/978-3-319-39943-0</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085812 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Chen, Jiageng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46298-1">https://doi.org/10.1007/978-3-319-46298-1</a><br/>Format:&#160;Electronic Resources<br/> Engineering Multi-Agent Systems 4th International Workshop, EMAS 2016, Singapore, Singapore, May 9-10, 2016, Revised, Selected, and Invited Papers ent://SD_ILS/0/SD_ILS:2086051 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Baldoni, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50983-9">https://doi.org/10.1007/978-3-319-50983-9</a><br/>Format:&#160;Electronic Resources<br/> Challenge of Transport Telematics 16th International Conference on Transport Systems Telematics, TST 2016, Katowice-Ustroń, Poland, March 16&ndash;19, 2016, Selected Papers ent://SD_ILS/0/SD_ILS:2084942 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Mikulski, Jerzy. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49646-7">https://doi.org/10.1007/978-3-319-49646-7</a><br/>Format:&#160;Electronic Resources<br/> Future Network Systems and Security Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084877 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Doss, Robin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48021-3">https://doi.org/10.1007/978-3-319-48021-3</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:2085246 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48671-0">https://doi.org/10.1007/978-3-319-48671-0</a><br/>Format:&#160;Electronic Resources<br/> Smart Cities First International Conference, Smart-CT 2016, M&aacute;laga, Spain, June 15-17, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085427 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Alba, Enrique. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39595-1">https://doi.org/10.1007/978-3-319-39595-1</a><br/>Format:&#160;Electronic Resources<br/> Smart City 360&deg; First EAI International Summit, Smart City 360&deg;, Bratislava, Slovakia and Toronto, Canada, October 13-16, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084967 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Leon-Garcia, Alberto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33681-7">https://doi.org/10.1007/978-3-319-33681-7</a><br/>Format:&#160;Electronic Resources<br/> Social, Cultural, and Behavioral Modeling 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28 - July 1, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085231 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Xu, Kevin S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39931-7">https://doi.org/10.1007/978-3-319-39931-7</a><br/>Format:&#160;Electronic Resources<br/> e-Infrastructure and e-Services 7th International Conference, AFRICOMM 2015, Cotonou, Benin, December 15-16, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084986 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Glitho, Roch. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43696-8">https://doi.org/10.1007/978-3-319-43696-8</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084875 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Hoepman, Jaap-Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33630-5">https://doi.org/10.1007/978-3-319-33630-5</a><br/>Format:&#160;Electronic Resources<br/> Multiple Access Communications 9th International Workshop, MACOM 2016, Aalborg, Denmark, November 21-22, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085095 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Madsen, Tatiana K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51376-8">https://doi.org/10.1007/978-3-319-51376-8</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085097 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Rome, Erich. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33331-1">https://doi.org/10.1007/978-3-319-33331-1</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5&ndash;6, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085888 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format:&#160;Electronic Resources<br/> Mobile Web and Intelligent Information Systems 13th International Conference, MobiWIS 2016, Vienna, Austria, August 22-24, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085419 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Younas, Muhammad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44215-0">https://doi.org/10.1007/978-3-319-44215-0</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:2085567 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48674-1">https://doi.org/10.1007/978-3-319-48674-1</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085215 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Panayiotou, Christos G. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31664-2">https://doi.org/10.1007/978-3-319-31664-2</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7&ndash;9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:2085526 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format:&#160;Electronic Resources<br/> Social Robotics 8th International Conference, ICSR 2016, Kansas City, MO, USA, November 1-3, 2016 Proceedings ent://SD_ILS/0/SD_ILS:2085687 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Agah, Arvin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47437-3">https://doi.org/10.1007/978-3-319-47437-3</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502803 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502691 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Bellovin, Steven M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503821 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Franklin, Matthew K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing &ndash; ICSOC 2008 6th International Conference, Sydney, Australia, December 1-5, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503823 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Bouguettaya, Athman. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89652-4">http://dx.doi.org/10.1007/978-3-540-89652-4</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503660 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 7th International Conference, EGOV 2008, Turin, Italy, August 31 - September 5, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503605 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85204-9">http://dx.doi.org/10.1007/978-3-540-85204-9</a><br/>Format:&#160;Electronic Resources<br/> Ad-hoc, Mobile and Wireless Networks 7th International Conference, ADHOC-NOW 2008 Sophia-Antipolis, France, September 10-12, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503606 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Coudert, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85209-4">http://dx.doi.org/10.1007/978-3-540-85209-4</a><br/>Format:&#160;Electronic Resources<br/> Towards Sustainable Society on Ubiquitous Networks The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24&ndash;16, 2008, Tokyo, Japan ent://SD_ILS/0/SD_ILS:502003 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Oya, Makoto. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-85691-9">http://dx.doi.org/10.1007/978-0-387-85691-9</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503610 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format:&#160;Electronic Resources<br/> Advanced Web and Network Technologies, and Applications APWeb 2008 International Workshops: BIDM, IWHDM, and DeWeb Shenyang, China, April 26-28, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503807 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Ishikawa, Yoshiharu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89376-9">http://dx.doi.org/10.1007/978-3-540-89376-9</a><br/>Format:&#160;Electronic Resources<br/> Modeling Communication with Robots and Virtual Humans Second ZiF Research Group International Workshop on Embodied Communication in Humans and Machines, Bielefeld, Germany, April 5-8, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503471 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Wachsmuth, Ipke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79037-2">http://dx.doi.org/10.1007/978-3-540-79037-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503563 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Onieva, Jose A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503843 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Ortiz-Arroyo, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89900-6">http://dx.doi.org/10.1007/978-3-540-89900-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503600 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Wagner, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format:&#160;Electronic Resources<br/> Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502750 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Computing 6th International Conference, Pervasive 2008 Sydney, Australia, May 19-22, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503543 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Indulska, Jadwiga. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79576-6">http://dx.doi.org/10.1007/978-3-540-79576-6</a><br/>Format:&#160;Electronic Resources<br/> Constructing Ambient Intelligence AmI 2007 Workshops Darmstadt, Germany, November 7-10, 2007 Revised Papers ent://SD_ILS/0/SD_ILS:503623 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;M&uuml;hlh&auml;user, Max. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85379-4">http://dx.doi.org/10.1007/978-3-540-85379-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503533 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Pei, Dingyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography &ndash; PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503372 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503818 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Matsuura, Kanta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format:&#160;Electronic Resources<br/> Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503375 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Bonchi, Francesco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78478-4">http://dx.doi.org/10.1007/978-3-540-78478-4</a><br/>Format:&#160;Electronic Resources<br/> Agents and Peer-to-Peer Computing 5th International Workshop, AP2PC 2006, Hakodate, Japan, May 9, 2006, Revised and Invited Papers ent://SD_ILS/0/SD_ILS:503547 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Joseph, Sam. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79705-0">http://dx.doi.org/10.1007/978-3-540-79705-0</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503664 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Grimaud, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503684 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Lippmann, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503789 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Solanki, Kaushal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503586 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format:&#160;Electronic Resources<br/> RFID Security and Privacy Concepts, Protocols, and Architectures ent://SD_ILS/0/SD_ILS:503478 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Henrici, Dirk. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79076-1">http://dx.doi.org/10.1007/978-3-540-79076-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503481 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format:&#160;Electronic Resources<br/> Tests and Proofs Second International Conference, TAP 2008, Prato, Italy, April 9-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503485 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Beckert, Bernhard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79124-9">http://dx.doi.org/10.1007/978-3-540-79124-9</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, M&aacute;laga, Spain, October 3-5, 2007. Revised Papers ent://SD_ILS/0/SD_ILS:503793 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format:&#160;Electronic Resources<br/> Trust in Agent Societies 11th International Workshop, TRUST 2008, Estoril, Portugal, May 12 -13, 2008. Revised Selected and Invited Papers ent://SD_ILS/0/SD_ILS:503868 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Falcone, Rino. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92803-4">http://dx.doi.org/10.1007/978-3-540-92803-4</a><br/>Format:&#160;Electronic Resources<br/> Groupware: Design, Implementation, and Use 14th International Workshop, CRIWG 2008, Omaha, NE, USA, September 14-18, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503869 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Briggs, Robert O. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92831-7">http://dx.doi.org/10.1007/978-3-540-92831-7</a><br/>Format:&#160;Electronic Resources<br/> Ubiquitous Intelligence and Computing 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502729 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Sandnes, Frode Eika. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69293-5">http://dx.doi.org/10.1007/978-3-540-69293-5</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502732 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69304-8">http://dx.doi.org/10.1007/978-3-540-69304-8</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502827 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format:&#160;Electronic Resources<br/> Smart Homes and Health Telematics 6th International Conference, ICOST 2008 Ames, IA, USA, June 28-July 2, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502786 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Helal, Sumi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69916-3">http://dx.doi.org/10.1007/978-3-540-69916-3</a><br/>Format:&#160;Electronic Resources<br/> Digital Human Modeling Trends in Human Algorithms ent://SD_ILS/0/SD_ILS:503810 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Cai, Yang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89430-8">http://dx.doi.org/10.1007/978-3-540-89430-8</a><br/>Format:&#160;Electronic Resources<br/> Ambient Intelligence European Conference, AmI 2008, Nuremberg, Germany, November 19-22, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503819 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Aarts, Emile. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89617-3">http://dx.doi.org/10.1007/978-3-540-89617-3</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503649 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Furnell, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, M&aacute;laga, Spain, October 6-8, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503749 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512529 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Computing 5th International Conference, PERVASIVE 2007, Toronto, Canada, May 13-16, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512430 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;LaMarca, Anthony. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72037-9">http://dx.doi.org/10.1007/978-3-540-72037-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512927 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Miyaji, Atsuko. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Web Mining and Web Usage Analysis 8th International Workshop on Knowledge Discovery on the Web, WebKDD 2006 Philadelphia, USA, August 20, 2006 Revised Papers ent://SD_ILS/0/SD_ILS:513039 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Nasraoui, Olfa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77485-3">http://dx.doi.org/10.1007/978-3-540-77485-3</a><br/>Format:&#160;Electronic Resources<br/> E-Voting and Identity First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513040 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Alkassar, Ammar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77493-8">http://dx.doi.org/10.1007/978-3-540-77493-8</a><br/>Format:&#160;Electronic Resources<br/> Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets AAMAS 2006 Workshop, TADA/AMEC 2006, Hakodate, Japan, May 9, 2006, Selected and Revised Papers ent://SD_ILS/0/SD_ILS:512482 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Fasli, Maria. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72502-2">http://dx.doi.org/10.1007/978-3-540-72502-2</a><br/>Format:&#160;Electronic Resources<br/> Groupware: Design, Implementation, and Use 13th International Workshop, CRIWG 2007, Bariloche, Argentina, September 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512838 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Haake, J&ouml;rg M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74812-0">http://dx.doi.org/10.1007/978-3-540-74812-0</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers ent://SD_ILS/0/SD_ILS:512756 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Camenisch, Jan L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers ent://SD_ILS/0/SD_ILS:513033 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513035 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Furon, Teddy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77370-2">http://dx.doi.org/10.1007/978-3-540-77370-2</a><br/>Format:&#160;Electronic Resources<br/> Tests and Proofs First International Conference, TAP 2007, Zurich, Switzerland, February 12-13, 2007. Revised Papers ent://SD_ILS/0/SD_ILS:512720 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Gurevich, Yuri. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73770-4">http://dx.doi.org/10.1007/978-3-540-73770-4</a><br/>Format:&#160;Electronic Resources<br/> Online Communities and Social Computing Second International Conference, OCSC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512623 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Schuler, Douglas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73257-0">http://dx.doi.org/10.1007/978-3-540-73257-0</a><br/>Format:&#160;Electronic Resources<br/> Managing Next Generation Networks and Services 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Sapporo, Japan, October 10-12, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512909 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Ata, Shingo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75476-3">http://dx.doi.org/10.1007/978-3-540-75476-3</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513007 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;McDaniel, Patrick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format:&#160;Electronic Resources<br/> Emerging Directions in Embedded and Ubiquitous Computing EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513009 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Denko, Mieso K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77090-9">http://dx.doi.org/10.1007/978-3-540-77090-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512761 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format:&#160;Electronic Resources<br/> Managing Virtualization of Networks and Services 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San Jos&eacute;, CA, USA, October 29-31, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512933 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Clemm, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75694-1">http://dx.doi.org/10.1007/978-3-540-75694-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512460 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Sauveron, Damien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512784 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Format:&#160;Electronic Resources<br/> Software Architectures, Components, and Applications Third International Conference on Quality of Software Architectures, QoSA 2007, Medford, MA, USA, July 11-23, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513045 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Overhage, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77619-2">http://dx.doi.org/10.1007/978-3-540-77619-2</a><br/>Format:&#160;Electronic Resources<br/> Ambient Intelligence European Conference, AmI 2007, Darmstadt, Germany, November 7-10, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512966 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Schiele, Bernt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76652-0">http://dx.doi.org/10.1007/978-3-540-76652-0</a><br/>Format:&#160;Electronic Resources<br/> Ubiquitous Computing Systems 4th International Symposium, UCS 2007, Tokyo, Japan, November 25-28, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512971 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Ichikawa, Haruhisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76772-5">http://dx.doi.org/10.1007/978-3-540-76772-5</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512703 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;H&auml;mmerli, Bernhard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing &ndash; ICSOC 2007 Fifth International Conference, Vienna, Austria, September 17-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512864 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Kr&auml;mer, Bernd J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74974-5">http://dx.doi.org/10.1007/978-3-540-74974-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512440 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Computing for Quality of Life Enhancement 5th International Conference On Smart Homes and Health Telematics, ICOST 2007, Nara, Japan, June 21-23, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512582 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Okadome, Takeshi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73035-4">http://dx.doi.org/10.1007/978-3-540-73035-4</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Intrusion Detection 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512777 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Kruegel, Christopher. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74320-0">http://dx.doi.org/10.1007/978-3-540-74320-0</a><br/>Format:&#160;Electronic Resources<br/> Ubiquitous Convergence Technology First International Conference, ICUCT 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512394 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71789-8">http://dx.doi.org/10.1007/978-3-540-71789-8</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 6th International Conference, EGOV 2007, Regensburg, Germany, September 3-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512788 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74444-3">http://dx.doi.org/10.1007/978-3-540-74444-3</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512991 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Bao, Feng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76969-9">http://dx.doi.org/10.1007/978-3-540-76969-9</a><br/>Format:&#160;Electronic Resources<br/> From Web to Social Web: Discovering and Deploying User and Content Profiles Workshop on Web Mining, WebMine 2006, Berlin, Germany, September 18, 2006. Revised Selected and Invited Papers ent://SD_ILS/0/SD_ILS:512858 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Berendt, Bettina. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74951-6">http://dx.doi.org/10.1007/978-3-540-74951-6</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing ICSOC 2006 4th International Conference, Chicago, IL, USA, December 4-7, 2006, Workshops Proceedings ent://SD_ILS/0/SD_ILS:512911 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Georgakopoulos, Dimitrios. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75492-3">http://dx.doi.org/10.1007/978-3-540-75492-3</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513017 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77156-2">http://dx.doi.org/10.1007/978-3-540-77156-2</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers ent://SD_ILS/0/SD_ILS:512922 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography &ndash; PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512381 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Okamoto, Tatsuaki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format:&#160;Electronic Resources<br/> UbiComp 2007: Ubiquitous Computing 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512849 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Krumm, John. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74853-3">http://dx.doi.org/10.1007/978-3-540-74853-3</a><br/>Format:&#160;Electronic Resources<br/> Dependable and Adaptable Networks and Services 13th Open European Summer School and IFIP TC6.6 Workshop, EUNICE 2007, Enschede, The Netherlands, July 18-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512686 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Pras, Aiko. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73530-4">http://dx.doi.org/10.1007/978-3-540-73530-4</a><br/>Format:&#160;Electronic Resources<br/> Ubiquitous Intelligence and Computing 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512691 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Indulska, Jadwiga. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73549-6">http://dx.doi.org/10.1007/978-3-540-73549-6</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513004 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format:&#160;Electronic Resources<br/> Embedded and Ubiquitous Computing International Conference, EUC 2007, Taipei, Taiwan, December 17-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513010 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Kuo, Tei-Wei. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77092-3">http://dx.doi.org/10.1007/978-3-540-77092-3</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512362 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71549-8">http://dx.doi.org/10.1007/978-3-540-71549-8</a><br/>Format:&#160;Electronic Resources<br/> Engineering Self-Organising Systems 4th International Workshop, ESOA 2006, Hakodate, Japan, May 9, 2006, Revised and Invited Papers ent://SD_ILS/0/SD_ILS:512195 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Brueckner, Sven A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69868-5">http://dx.doi.org/10.1007/978-3-540-69868-5</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics: Biosurveillance Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May 22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512504 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Zeng, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72608-1">http://dx.doi.org/10.1007/978-3-540-72608-1</a><br/>Format:&#160;Electronic Resources<br/> Ad-Hoc, Mobile, and Wireless Networks 6th International Conference, ADHOC-NOW 2007, Morelia, Mexico, September 24-26, 2007, Proceeedings ent://SD_ILS/0/SD_ILS:512841 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Kranakis, Evangelos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74823-6">http://dx.doi.org/10.1007/978-3-540-74823-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 &mdash; 26, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512846 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Biskup, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512888 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">http://dx.doi.org/10.1007/978-3-540-75227-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512107 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11957454">http://dx.doi.org/10.1007/11957454</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - CRYPTO 2006 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511499 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Dwork, Cynthia. editor.<br/><a href="http://dx.doi.org/10.1007/11818175">http://dx.doi.org/10.1007/11818175</a><br/>Format:&#160;Electronic Resources<br/> Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms AAMAS 2005 Workshop, AMEC 2005, Utrecht, Netherlands, July 25, 2005, and IJCAI 2005 Workshop, TADA 2005, Edinburgh, UK, August 1, 2005, Selected and Revised Papers ent://SD_ILS/0/SD_ILS:511767 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Poutr&eacute;, Han. editor.<br/><a href="http://dx.doi.org/10.1007/11888727">http://dx.doi.org/10.1007/11888727</a><br/>Format:&#160;Electronic Resources<br/> Groupware: Design, Implementation, and Use 12th International Workshop, CRIWG 2006, Medina del Campo, Spain, September 17-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511645 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Dimitriadis, Yannis A. editor.<br/><a href="http://dx.doi.org/10.1007/11853862">http://dx.doi.org/10.1007/11853862</a><br/>Format:&#160;Electronic Resources<br/> Embedded and Ubiquitous Computing International Conference, EUC 2006, Seoul, Korea, August 1-4, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511398 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Sha, Edwin. editor.<br/><a href="http://dx.doi.org/10.1007/11802167">http://dx.doi.org/10.1007/11802167</a><br/>Format:&#160;Electronic Resources<br/> Web Services and Formal Methods Third International Workshop, WS-FM 2006 Vienna, Austria, September 8-9, 2006 Proceedings ent://SD_ILS/0/SD_ILS:511616 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Bravetti, Mario. editor.<br/><a href="http://dx.doi.org/10.1007/11841197">http://dx.doi.org/10.1007/11841197</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects in Security and Trust Thrid International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510720 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/11679219">http://dx.doi.org/10.1007/11679219</a><br/>Format:&#160;Electronic Resources<br/> UbiComp 2006: Ubiquitous Computing 8th International Conference, UbiComp 2006 Orange County, CA, USA, September 17-21, 2006 Proceedings ent://SD_ILS/0/SD_ILS:511650 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Dourish, Paul. editor.<br/><a href="http://dx.doi.org/10.1007/11853565">http://dx.doi.org/10.1007/11853565</a><br/>Format:&#160;Electronic Resources<br/> Trends in Enterprise Application Architecture VLDB Workshop, TEAA 2005, Trondheim, Norway, August 28, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510750 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Draheim, Dirk. editor.<br/><a href="http://dx.doi.org/10.1007/11681885">http://dx.doi.org/10.1007/11681885</a><br/>Format:&#160;Electronic Resources<br/> Frontiers of WWW Research and Development - APWeb 2006 8th Asia-Pacific Web Conference, Harbin, China, January 16-18, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510662 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Zhou, Xiaofang. editor.<br/><a href="http://dx.doi.org/10.1007/11610113">http://dx.doi.org/10.1007/11610113</a><br/>Format:&#160;Electronic Resources<br/> Security in Pervasive Computing Third International Conference, SPC 2006, York, UK, April 18-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510920 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Clark, John A. editor.<br/><a href="http://dx.doi.org/10.1007/11734666">http://dx.doi.org/10.1007/11734666</a><br/>Format:&#160;Electronic Resources<br/> Digital Rights Management. Technologies, Issues, Challenges and Systems First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:511342 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/11787952">http://dx.doi.org/10.1007/11787952</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware &amp; Vulnerability Assessment Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511345 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;B&uuml;schkes, Roland. editor.<br/><a href="http://dx.doi.org/10.1007/11790754">http://dx.doi.org/10.1007/11790754</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511967 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Ning, Peng. editor.<br/><a href="http://dx.doi.org/10.1007/11935308">http://dx.doi.org/10.1007/11935308</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510908 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/11733447">http://dx.doi.org/10.1007/11733447</a><br/>Format:&#160;Electronic Resources<br/> Emerging Trends in Information and Communication Security International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511182 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;M&uuml;ller, G&uuml;nter. editor.<br/><a href="http://dx.doi.org/10.1007/11766155">http://dx.doi.org/10.1007/11766155</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:512125 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Bagchi, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format:&#160;Electronic Resources<br/> Agents and Peer-to-Peer Computing 4th International Workshop, AP2PC 2005, Utrecht, The Netherlands, July 25, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:512126 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Despotovic, Zoran. editor.<br/><a href="http://dx.doi.org/10.1007/11925941">http://dx.doi.org/10.1007/11925941</a><br/>Format:&#160;Electronic Resources<br/> Trust and Privacy in Digital Business Third International Conference, TrustBus 2006, Krak&oacute;w, Poland, September 4-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511566 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Fischer-H&uuml;bner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/11824633">http://dx.doi.org/10.1007/11824633</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511961 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/11935070">http://dx.doi.org/10.1007/11935070</a><br/>Format:&#160;Electronic Resources<br/> Management of Convergence Networks and Services 9th Asia-Pacific Network Operations and Management Symposium, APNOMS 2006 Busan, Korea, September 27-29, 2006 Proceedings ent://SD_ILS/0/SD_ILS:511761 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Kim, Young-Tak. editor.<br/><a href="http://dx.doi.org/10.1007/11876601">http://dx.doi.org/10.1007/11876601</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511983 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Lipmaa, Helger. editor.<br/><a href="http://dx.doi.org/10.1007/11937807">http://dx.doi.org/10.1007/11937807</a><br/>Format:&#160;Electronic Resources<br/> Ubiquitous Computing Systems Third International Symposium, UCS 2006, Seoul, Korea, October 11-13, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511779 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Youn, Hee Yong. editor.<br/><a href="http://dx.doi.org/10.1007/11890348">http://dx.doi.org/10.1007/11890348</a><br/>Format:&#160;Electronic Resources<br/> Advances in Web Mining and Web Usage Analysis 7th International Workshop on Knowledge Discovery on the Web, WebKDD 2005, Chicago, IL, USA, August 21, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:511787 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Nasraoui, Olfa. editor.<br/><a href="http://dx.doi.org/10.1007/11891321">http://dx.doi.org/10.1007/11891321</a><br/>Format:&#160;Electronic Resources<br/> Ad-Hoc, Mobile, and Wireless Networks 5th International Conference, ADHOC-NOW 2006, Ottawa, Canada, August 17-19, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511472 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Kunz, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/11814764">http://dx.doi.org/10.1007/11814764</a><br/>Format:&#160;Electronic Resources<br/> Quality of Software Architectures Second International Conference on Quality of Software Architectures, QoSA 2006, V&auml;ster&aring;s, Sweden, June 27-29, 2006 Revised Papers ent://SD_ILS/0/SD_ILS:511913 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Hofmeister, Christine. editor.<br/><a href="http://dx.doi.org/10.1007/11921998">http://dx.doi.org/10.1007/11921998</a><br/>Format:&#160;Electronic Resources<br/> Advances in Web Mining and Web Usage Analysis 6th International Workshop on Knowledge Discovery on the Web, WebKDD 2004, Seattle, WA, USA, August 22-25, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:511829 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Mobasher, Bamshad. editor.<br/><a href="http://dx.doi.org/10.1007/11899402">http://dx.doi.org/10.1007/11899402</a><br/>Format:&#160;Electronic Resources<br/> Ubiquitous Intelligence and Computing Third International Conference, UIC 2006, Wuhan, China, September 3-6, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511589 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Ma, Jianhua. editor.<br/><a href="http://dx.doi.org/10.1007/11833529">http://dx.doi.org/10.1007/11833529</a><br/>Format:&#160;Electronic Resources<br/> Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511771 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Breveglieri, Luca. editor.<br/><a href="http://dx.doi.org/10.1007/11889700">http://dx.doi.org/10.1007/11889700</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:511773 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Crescenzo, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/11889663">http://dx.doi.org/10.1007/11889663</a><br/>Format:&#160;Electronic Resources<br/> Advances in Database Technology - EDBT 2006 10th International Conference on Extending Database Technology, Munich, Germany, March 26-31, 2006 ent://SD_ILS/0/SD_ILS:510803 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Ioannidis, Yannis. editor.<br/><a href="http://dx.doi.org/10.1007/11687238">http://dx.doi.org/10.1007/11687238</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510825 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Chen, Kefei. editor.<br/><a href="http://dx.doi.org/10.1007/11689522">http://dx.doi.org/10.1007/11689522</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Intrusion Detection 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:510179 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Valdes, Alfonso. editor.<br/><a href="http://dx.doi.org/10.1007/11663812">http://dx.doi.org/10.1007/11663812</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:511663 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11861386">http://dx.doi.org/10.1007/11861386</a><br/>Format:&#160;Electronic Resources<br/> Engineering Self-Organising Systems Third International Workshop, ESOA 2005, Utrecht, The Netherlands, July 25, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510915 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Brueckner, Sven A. editor.<br/><a href="http://dx.doi.org/10.1007/11734697">http://dx.doi.org/10.1007/11734697</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Computing 4th International Conference, PERVASIVE 2006, Dublin, Ireland, May 7-10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511014 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Fishkin, Kenneth P. editor.<br/><a href="http://dx.doi.org/10.1007/11748625">http://dx.doi.org/10.1007/11748625</a><br/>Format:&#160;Electronic Resources<br/> Innovative Internet Community Systems 5th International Workshop, IICS 2005, Paris, France, June 20-22, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:511022 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Bui, Alain. editor.<br/><a href="http://dx.doi.org/10.1007/11749776">http://dx.doi.org/10.1007/11749776</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510918 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Chen, Hsinchun. editor.<br/><a href="http://dx.doi.org/10.1007/11734628">http://dx.doi.org/10.1007/11734628</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:511208 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11767831">http://dx.doi.org/10.1007/11767831</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511137 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Mehrotra, Sharad. editor.<br/><a href="http://dx.doi.org/10.1007/11760146">http://dx.doi.org/10.1007/11760146</a><br/>Format:&#160;Electronic Resources<br/> Technologies for E-Services 6th International Workshop, TES 2005, Trondheim, Norway, September 2-3, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510786 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Bussler, Christoph. editor.<br/><a href="http://dx.doi.org/10.1007/11607380">http://dx.doi.org/10.1007/11607380</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Intrusion Detection 9th International Symposium, RAID 2006 Hamburg, Germany, September 20-22, 2006 Proceedings ent://SD_ILS/0/SD_ILS:511652 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/11856214">http://dx.doi.org/10.1007/11856214</a><br/>Format:&#160;Electronic Resources<br/> Advanced Web and Network Technologies, and Applications APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Harbin, China, January 16-18, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510660 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Shen, Heng Tao. editor.<br/><a href="http://dx.doi.org/10.1007/11610496">http://dx.doi.org/10.1007/11610496</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511681 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Gollmann, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/11863908">http://dx.doi.org/10.1007/11863908</a><br/>Format:&#160;Electronic Resources<br/> Trust Management 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511090 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;St&oslash;len, Ketil. editor.<br/><a href="http://dx.doi.org/10.1007/11755593">http://dx.doi.org/10.1007/11755593</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511199 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11767480">http://dx.doi.org/10.1007/11767480</a><br/>Format:&#160;Electronic Resources<br/> Emerging Directions in Embedded and Ubiquitous Computing EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511434 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Zhou, Xiaobo. editor.<br/><a href="http://dx.doi.org/10.1007/11807964">http://dx.doi.org/10.1007/11807964</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 5th International Conference, EGOV 2006, Krak&oacute;w, Poland, September 4-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511544 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/11823100">http://dx.doi.org/10.1007/11823100</a><br/>Format:&#160;Electronic Resources<br/> Large Scale Management of Distributed Systems 17th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2006, Dublin, Ireland, October 23-25, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511847 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;State, Radu. editor.<br/><a href="http://dx.doi.org/10.1007/11907466">http://dx.doi.org/10.1007/11907466</a><br/>Format:&#160;Electronic Resources<br/> Semantics, Web and Mining Joint International Workshops, EWMF 2005 and KDO 2005, Porto, Portugal, October 3-7, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:511851 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Ackermann, Markus. editor.<br/><a href="http://dx.doi.org/10.1007/11908678">http://dx.doi.org/10.1007/11908678</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511852 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Yoshiura, Hiroshi. editor.<br/><a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing &ndash; ICSOC 2006 4th International Conference, Chicago, IL, USA, December 4-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:512056 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Dan, Asit. editor.<br/><a href="http://dx.doi.org/10.1007/11948148">http://dx.doi.org/10.1007/11948148</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papers ent://SD_ILS/0/SD_ILS:512135 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/11962977">http://dx.doi.org/10.1007/11962977</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511586 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Prisco, Roberto. editor.<br/><a href="http://dx.doi.org/10.1007/11832072">http://dx.doi.org/10.1007/11832072</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511007 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/11745853">http://dx.doi.org/10.1007/11745853</a><br/>Format:&#160;Electronic Resources<br/> Innovative Internet Community Systems 4th International Workshop, IICS 2004, Guadalajara, Mexico, June 21-23, 2004. Revised Papers ent://SD_ILS/0/SD_ILS:511031 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;B&ouml;hme, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/11553762">http://dx.doi.org/10.1007/11553762</a><br/>Format:&#160;Electronic Resources<br/> Digital Cities III. Information Technologies for Social Capital: Cross-cultural Perspectives Third International Digital Cities Workshop, Amsterdam, The Netherlands, September 18-19, 2003. Revised Selected Papers ent://SD_ILS/0/SD_ILS:508833 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Besselaar, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/b107136">http://dx.doi.org/10.1007/b107136</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509757 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:509964 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Barni, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/11558859">http://dx.doi.org/10.1007/11558859</a><br/>Format:&#160;Electronic Resources<br/> Agents and Peer-to-Peer Computing Third International Workshop, AP2PC 2004, New York, NY, USA, July 19, 2004, Revised and Invited Papers ent://SD_ILS/0/SD_ILS:510112 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Moro, Gianluca. editor.<br/><a href="http://dx.doi.org/10.1007/11574781">http://dx.doi.org/10.1007/11574781</a><br/>Format:&#160;Electronic Resources<br/> UbiComp 2005: Ubiquitous Computing 7th International Conference, UbiComp 2005, Tokyo, Japan, September 11-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510313 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Beigl, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/11551201">http://dx.doi.org/10.1007/11551201</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing - ICSOC 2005 Third International Conference, Amsterdam, The Netherlands, December 12-15, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510568 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Benatallah, Boualem. editor.<br/><a href="http://dx.doi.org/10.1007/11596141">http://dx.doi.org/10.1007/11596141</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 4th International Conference, EGOV 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510163 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/11545156">http://dx.doi.org/10.1007/11545156</a><br/>Format:&#160;Electronic Resources<br/> Universal Access in Health Telematics A Design Code of Practice ent://SD_ILS/0/SD_ILS:510165 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Stephanidis, Constantine. editor.<br/><a href="http://dx.doi.org/10.1007/b136257">http://dx.doi.org/10.1007/b136257</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510648 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510650 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Feng, Dengguo. editor.<br/><a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format:&#160;Electronic Resources<br/> Agent-Mediated Electronic Commerce VI. Theories for and Engineering of Distributed Mechanisms and Systems AAMAS 2004 Workshop, AMEC 2004, New York, NY, USA, July 19, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510856 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Faratin, Peyman. editor.<br/><a href="http://dx.doi.org/10.1007/11575726">http://dx.doi.org/10.1007/11575726</a><br/>Format:&#160;Electronic Resources<br/> Groupware: Design, Implementation, and Use 11th International Workshop, CRIWG 2005, Porto de Galinhas, Brazil, September 25-29, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510368 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Fukś, Hugo. editor.<br/><a href="http://dx.doi.org/10.1007/11560296">http://dx.doi.org/10.1007/11560296</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510103 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Julisch, Klaus. editor.<br/><a href="http://dx.doi.org/10.1007/b137798">http://dx.doi.org/10.1007/b137798</a><br/>Format:&#160;Electronic Resources<br/> Trust Management Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510403 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Herrmann, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/b136639">http://dx.doi.org/10.1007/b136639</a><br/>Format:&#160;Electronic Resources<br/> Current Trends in Database Technology - EDBT 2004 Workshops EDBT 2004 Workshops PhD, DataX, PIM, P2P&amp;DB, and ClustWeb, Heraklion, Crete, Greece, March 14-18, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:509679 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Lindner, Wolfgang. editor.<br/><a href="http://dx.doi.org/10.1007/b101218">http://dx.doi.org/10.1007/b101218</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Techniques for Web Personalization IJCAI 2003 Workshop, ITWP 2003, Acapulco, Mexico, August 11, 2003, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510111 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Mobasher, Bamshad. editor.<br/><a href="http://dx.doi.org/10.1007/11577935">http://dx.doi.org/10.1007/11577935</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 &ndash; March 3, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:510132 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Patrick, Andrew S. editor.<br/><a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy, and Security in Digital Business Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510186 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/11537878">http://dx.doi.org/10.1007/11537878</a><br/>Format:&#160;Electronic Resources<br/> Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510302 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509671 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Fridrich, Jessica. editor.<br/><a href="http://dx.doi.org/10.1007/b104759">http://dx.doi.org/10.1007/b104759</a><br/>Format:&#160;Electronic Resources<br/> Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509770 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Blundo, Carlo. editor.<br/><a href="http://dx.doi.org/10.1007/b105083">http://dx.doi.org/10.1007/b105083</a><br/>Format:&#160;Electronic Resources<br/> Ambient Networks 16th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2005, Barcelona, Spain, October 24-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510520 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Sch&ouml;nw&auml;lder, J&uuml;rgen. editor.<br/><a href="http://dx.doi.org/10.1007/11568285">http://dx.doi.org/10.1007/11568285</a><br/>Format:&#160;Electronic Resources<br/> Trusting Agents for Trusting Electronic Societies Theory and Applications in HCI and E-Commerce ent://SD_ILS/0/SD_ILS:510242 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Falcone, Rino. editor.<br/><a href="http://dx.doi.org/10.1007/11532095">http://dx.doi.org/10.1007/11532095</a><br/>Format:&#160;Electronic Resources<br/> Embedded and Ubiquitous Computing &ndash; EUC 2005 International Conference EUC 2005, Nagasaki, Japan, December 6-9, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510569 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Yang, Laurence T. editor.<br/><a href="http://dx.doi.org/10.1007/11596356">http://dx.doi.org/10.1007/11596356</a><br/>Format:&#160;Electronic Resources<br/> Embedded and Ubiquitous Computing &ndash; EUC 2005 Workshops EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510570 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Enokido, Tomoya. editor.<br/><a href="http://dx.doi.org/10.1007/11596042">http://dx.doi.org/10.1007/11596042</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510572 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Desmedt, Yvo G. editor.<br/><a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format:&#160;Electronic Resources<br/> Ad-Hoc, Mobile, and Wireless Networks 4th International Conference, ADHOC-NOW 2005, Cancun, Mexico, October 6-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510446 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Syrotiuk, Violet R. editor.<br/><a href="http://dx.doi.org/10.1007/11561354">http://dx.doi.org/10.1007/11561354</a><br/>Format:&#160;Electronic Resources<br/> Web and Communication Technologies and Internet-Related Social Issues - HSI 2005 3rd International Conference on Human.Society@Internet, Tokyo, Japan, July 27-29, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510192 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Shimojo, Shinji. editor.<br/><a href="http://dx.doi.org/10.1007/11527725">http://dx.doi.org/10.1007/11527725</a><br/>Format:&#160;Electronic Resources<br/> Ubiquitous Computing Systems Second International Symposium, UCS 2004, Tokyo, Japan, November 8-9, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510193 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Murakami, Hitomi. editor.<br/><a href="http://dx.doi.org/10.1007/11526858">http://dx.doi.org/10.1007/11526858</a><br/>Format:&#160;Electronic Resources<br/> Engineering Self-Organising Systems Methodologies and Applications ent://SD_ILS/0/SD_ILS:510284 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Brueckner, Sven A. editor.<br/><a href="http://dx.doi.org/10.1007/b136984">http://dx.doi.org/10.1007/b136984</a><br/>Format:&#160;Electronic Resources<br/> Formal Techniques for Computer Systems and Business Processes European Performance Engineering Workshop, EPEW 2005 and International Workshop on Web Services and Formal Methods, WS-FM 2005, Versailles, France, September 1-3, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510286 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Bravetti, Mario. editor.<br/><a href="http://dx.doi.org/10.1007/11549970">http://dx.doi.org/10.1007/11549970</a><br/>Format:&#160;Electronic Resources<br/> Security in Pervasive Computing Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510370 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Hutter, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/b135497">http://dx.doi.org/10.1007/b135497</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Computing Third International Conference, PERVASIVE 2005, Munich, Germany, May 8-13, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510397 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Gellersen, Hans -W. editor.<br/><a href="http://dx.doi.org/10.1007/b136550">http://dx.doi.org/10.1007/b136550</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510219 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format:&#160;Electronic Resources<br/> Quality of Software Architectures and Software Quality First International Conference on the Quality of Software Architectures, QoSA 2005, and Second International Workshop on Software Quality, SOQUA 2005, Erfurt, Germany, September 20-22, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510419 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Reussner, Ralf. editor.<br/><a href="http://dx.doi.org/10.1007/11558569">http://dx.doi.org/10.1007/11558569</a><br/>Format:&#160;Electronic Resources<br/> Web Technologies Research and Development - APWeb 2005 7th Asia-Pacific Web Conference, Shanghai, China, March 29 - April 1, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510232 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Zhang, Yanchun. editor.<br/><a href="http://dx.doi.org/10.1007/b106936">http://dx.doi.org/10.1007/b106936</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510424 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Kantor, Paul. editor.<br/><a href="http://dx.doi.org/10.1007/b136511">http://dx.doi.org/10.1007/b136511</a><br/>Format:&#160;Electronic Resources<br/> Networking - ICN 2005 4th International Conference on Networking, Reunion Island, France, April 17-21, 2005, Proceedings, Part I ent://SD_ILS/0/SD_ILS:510327 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Lorenz, Pascal. editor.<br/><a href="http://dx.doi.org/10.1007/b107117">http://dx.doi.org/10.1007/b107117</a><br/>Format:&#160;Electronic Resources<br/> Networking - ICN 2005 4th International Conference on Networking, Reunion Island, France, April 17-21, 2005, Proceedings, Part II ent://SD_ILS/0/SD_ILS:510328 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Lorenz, Pascal. editor.<br/><a href="http://dx.doi.org/10.1007/b107118">http://dx.doi.org/10.1007/b107118</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:510331 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Martin, David. editor.<br/><a href="http://dx.doi.org/10.1007/b136164">http://dx.doi.org/10.1007/b136164</a><br/>Format:&#160;Electronic Resources<br/> Networking and Mobile Computing Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510251 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Lu, Xicheng. editor.<br/><a href="http://dx.doi.org/10.1007/11534310">http://dx.doi.org/10.1007/11534310</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2005 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510253 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Shoup, Victor. editor.<br/><a href="http://dx.doi.org/10.1007/11535218">http://dx.doi.org/10.1007/11535218</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 &ndash; 21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510348 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Dittmann, Jana. editor.<br/><a href="http://dx.doi.org/10.1007/11552055">http://dx.doi.org/10.1007/11552055</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510349 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510351 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Vimercati, Sabrina de Capitani. editor.<br/><a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format:&#160;Electronic Resources<br/> Technologies for E-Services 5th International Workshop, TES 2004, Toronto, Canada, August 29-30, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510195 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Shan, Ming-Chien. editor.<br/><a href="http://dx.doi.org/10.1007/b106626">http://dx.doi.org/10.1007/b106626</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510459 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510364 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Gorodetsky, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format:&#160;Electronic Resources<br/> Audio- and Video-Based Biometric Person Authentication 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510099 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Kanade, Takeo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-31638-1">http://dx.doi.org/10.1007/978-3-540-31638-1</a><br/>Format:&#160;Electronic Resources<br/> Object-Oriented Technology. ECOOP 2004 Workshop Reader ECOOP 2004 Workshops, Oslo, Norway, June 14-18, 2004, Final Reports ent://SD_ILS/0/SD_ILS:509736 2024-05-25T21:56:01Z 2024-05-25T21:56:01Z by&#160;Malenfant, Jacques. editor.<br/><a href="http://dx.doi.org/10.1007/b104146">http://dx.doi.org/10.1007/b104146</a><br/>Format:&#160;Electronic Resources<br/>