Search Results for - Narrowed by: Information Storage and Retrieval. - Information Systems.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Information$002bStorage$002band$002bRetrieval.$002509Information$002bStorage$002band$002bRetrieval.$0026qf$003dSUBJECT$002509Subject$002509Information$002bSystems.$002509Information$002bSystems.$0026ps$003d300?2024-06-06T15:16:14ZSemantic Applications Methodology, Technology, Corporate Useent://SD_ILS/0/SD_ILS:20844512024-06-06T15:16:14Z2024-06-06T15:16:14Zby Hoppe, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-55433-3">https://doi.org/10.1007/978-3-662-55433-3</a><br/>Format: Electronic Resources<br/>Information Literacy in the Workplace 5th European Conference, ECIL 2017, Saint Malo, France, September 18-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847982024-06-06T15:16:14Z2024-06-06T15:16:14Zby Kurbanoğlu, Serap. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74334-9">https://doi.org/10.1007/978-3-319-74334-9</a><br/>Format: Electronic Resources<br/>Data Privacy Gamesent://SD_ILS/0/SD_ILS:20845012024-06-06T15:16:14Z2024-06-06T15:16:14Zby Xu, Lei. author.<br/><a href="https://doi.org/10.1007/978-3-319-77965-2">https://doi.org/10.1007/978-3-319-77965-2</a><br/>Format: Electronic Resources<br/>System Analysis and Modeling. Technology-Specific Aspects of Models 9th International Conference, SAM 2016, Saint-Melo, France, October 3-4, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20850872024-06-06T15:16:14Z2024-06-06T15:16:14Zby Grabowski, Jens. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46613-2">https://doi.org/10.1007/978-3-319-46613-2</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860662024-06-06T15:16:14Z2024-06-06T15:16:14Zby Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48057-2">https://doi.org/10.1007/978-3-319-48057-2</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854432024-06-06T15:16:14Z2024-06-06T15:16:14Zby Bica, Ion. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47238-6">https://doi.org/10.1007/978-3-319-47238-6</a><br/>Format: Electronic Resources<br/>Business Process Management 14th International Conference, BPM 2016, Rio de Janeiro, Brazil, September 18-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20857682024-06-06T15:16:14Z2024-06-06T15:16:14Zby La Rosa, Marcello. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45348-4">https://doi.org/10.1007/978-3-319-45348-4</a><br/>Format: Electronic Resources<br/>Requirements Engineering: Foundation for Software Quality 22nd International Working Conference, REFSQ 2016, Gothenburg, Sweden, March 14-17, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857012024-06-06T15:16:14Z2024-06-06T15:16:14Zby Daneva, Maya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30282-9">https://doi.org/10.1007/978-3-319-30282-9</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data and Processes 6th International Provenance and Annotation Workshop, IPAW 2016, McLean, VA, USA, June 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859962024-06-06T15:16:14Z2024-06-06T15:16:14Zby Mattoso, Marta. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40593-3">https://doi.org/10.1007/978-3-319-40593-3</a><br/>Format: Electronic Resources<br/>Model and Data Engineering 6th International Conference, MEDI 2016, Almería, Spain, September 21-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856142024-06-06T15:16:14Z2024-06-06T15:16:14Zby Bellatreche, Ladjel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45547-1">https://doi.org/10.1007/978-3-319-45547-1</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing 14th International Conference, ICSOC 2016, Banff, AB, Canada, October 10-13, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860032024-06-06T15:16:14Z2024-06-06T15:16:14Zby Sheng, Quan Z. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46295-0">https://doi.org/10.1007/978-3-319-46295-0</a><br/>Format: Electronic Resources<br/>Service-Oriented and Cloud Computing 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850822024-06-06T15:16:14Z2024-06-06T15:16:14Zby Aiello, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44482-6">https://doi.org/10.1007/978-3-319-44482-6</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861532024-06-06T15:16:14Z2024-06-06T15:16:14Zby Tryfonas, Theo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39381-0">https://doi.org/10.1007/978-3-319-39381-0</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028272024-06-06T15:16:14Z2024-06-06T15:16:14Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format: Electronic Resources<br/>Service Availability 5th International Service Availability Symposium, ISAS 2008 Tokyo, Japan, May 19-21, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026202024-06-06T15:16:14Z2024-06-06T15:16:14Zby Nanya, Takashi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68129-8">http://dx.doi.org/10.1007/978-3-540-68129-8</a><br/>Format: Electronic Resources<br/>Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038392024-06-06T15:16:14Z2024-06-06T15:16:14Zby Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5034812024-06-06T15:16:14Z2024-06-06T15:16:14Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format: Electronic Resources<br/>Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036132024-06-06T15:16:14Z2024-06-06T15:16:14Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85259-9">http://dx.doi.org/10.1007/978-3-540-85259-9</a><br/>Format: Electronic Resources<br/>Preserving Digital Informationent://SD_ILS/0/SD_ILS:5115792024-06-06T15:16:14Z2024-06-06T15:16:14Zby Gladney, Henry M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-37887-7">http://dx.doi.org/10.1007/978-3-540-37887-7</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124402024-06-06T15:16:14Z2024-06-06T15:16:14Zby Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papersent://SD_ILS/0/SD_ILS:5129222024-06-06T15:16:14Z2024-06-06T15:16:14Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5128882024-06-06T15:16:14Z2024-06-06T15:16:14Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">http://dx.doi.org/10.1007/978-3-540-75227-1</a><br/>Format: Electronic Resources<br/>Secure Data Management 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128892024-06-06T15:16:14Z2024-06-06T15:16:14Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75248-6">http://dx.doi.org/10.1007/978-3-540-75248-6</a><br/>Format: Electronic Resources<br/>Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130072024-06-06T15:16:14Z2024-06-06T15:16:14Zby McDaniel, Patrick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format: Electronic Resources<br/>Computational Intelligence and Security International Conference, CIS 2006. Guangzhou, China, November 3-6, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:5127822024-06-06T15:16:14Z2024-06-06T15:16:14Zby Wang, Yuping. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74377-4">http://dx.doi.org/10.1007/978-3-540-74377-4</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5121072024-06-06T15:16:14Z2024-06-06T15:16:14Zby Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11957454">http://dx.doi.org/10.1007/11957454</a><br/>Format: Electronic Resources<br/>Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5117712024-06-06T15:16:14Z2024-06-06T15:16:14Zby Breveglieri, Luca. editor.<br/><a href="http://dx.doi.org/10.1007/11889700">http://dx.doi.org/10.1007/11889700</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust Thrid International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5107202024-06-06T15:16:14Z2024-06-06T15:16:14Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/11679219">http://dx.doi.org/10.1007/11679219</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5112082024-06-06T15:16:14Z2024-06-06T15:16:14Zby Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11767831">http://dx.doi.org/10.1007/11767831</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5108252024-06-06T15:16:14Z2024-06-06T15:16:14Zby Chen, Kefei. editor.<br/><a href="http://dx.doi.org/10.1007/11689522">http://dx.doi.org/10.1007/11689522</a><br/>Format: Electronic Resources<br/>Business Process Management 4th International Conference, BPM 2006, Vienna, Austria, September 5-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116232024-06-06T15:16:14Z2024-06-06T15:16:14Zby Dustdar, Schahram. editor.<br/><a href="http://dx.doi.org/10.1007/11841760">http://dx.doi.org/10.1007/11841760</a><br/>Format: Electronic Resources<br/>Secure Data Management Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116252024-06-06T15:16:14Z2024-06-06T15:16:14Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11844662">http://dx.doi.org/10.1007/11844662</a><br/>Format: Electronic Resources<br/>Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5121252024-06-06T15:16:14Z2024-06-06T15:16:14Zby Bagchi, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format: Electronic Resources<br/>Computational Intelligence and Security International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings Part Ient://SD_ILS/0/SD_ILS:5100762024-06-06T15:16:14Z2024-06-06T15:16:14Zby Hao, Yue. editor.<br/><a href="http://dx.doi.org/10.1007/11596448">http://dx.doi.org/10.1007/11596448</a><br/>Format: Electronic Resources<br/>Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5106482024-06-06T15:16:14Z2024-06-06T15:16:14Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format: Electronic Resources<br/>Secure Data Management Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103442024-06-06T15:16:14Z2024-06-06T15:16:14Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11552338">http://dx.doi.org/10.1007/11552338</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103492024-06-06T15:16:14Z2024-06-06T15:16:14Zby Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format: Electronic Resources<br/>Computer Network Securityent://SD_ILS/0/SD_ILS:5043732024-06-06T15:16:14Z2024-06-06T15:16:14Zby Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5103312024-06-06T15:16:14Z2024-06-06T15:16:14Zby Martin, David. editor.<br/><a href="http://dx.doi.org/10.1007/b136164">http://dx.doi.org/10.1007/b136164</a><br/>Format: Electronic Resources<br/>