Search Results for - Narrowed by: Management of Computing and Information Systems. - Computer Communication Networks. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026ps$003d300? 2024-06-13T14:51:44Z Smart Cities Development and Governance Frameworks ent://SD_ILS/0/SD_ILS:2084450 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76669-0">https://doi.org/10.1007/978-3-319-76669-0</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Mobile Data Privacy ent://SD_ILS/0/SD_ILS:2084303 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Gkoulalas-Divanis, Aris. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format:&#160;Electronic Resources<br/> Crowdsourcing of Sensor Cloud Services ent://SD_ILS/0/SD_ILS:2084719 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Ghari Neiat, Azadeh. author.<br/><a href="https://doi.org/10.1007/978-3-319-91536-4">https://doi.org/10.1007/978-3-319-91536-4</a><br/>Format:&#160;Electronic Resources<br/> Economic Models for Managing Cloud Services ent://SD_ILS/0/SD_ILS:2084899 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Mistry, Sajib. author.<br/><a href="https://doi.org/10.1007/978-3-319-73876-5">https://doi.org/10.1007/978-3-319-73876-5</a><br/>Format:&#160;Electronic Resources<br/> Fog Computing Concepts, Frameworks and Technologies ent://SD_ILS/0/SD_ILS:2084983 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94890-4">https://doi.org/10.1007/978-3-319-94890-4</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2018 The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085579 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Smart, Nigel P. editor. (orcid)0000-0003-3567-3304<br/><a href="https://doi.org/10.1007/978-3-319-76953-0">https://doi.org/10.1007/978-3-319-76953-0</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing Strategies for Engineering 25th EG-ICE International Workshop 2018, Lausanne, Switzerland, June 10-13, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086037 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Smith, Ian F. C. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91635-4">https://doi.org/10.1007/978-3-319-91635-4</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing Strategies for Engineering 25th EG-ICE International Workshop 2018, Lausanne, Switzerland, June 10-13, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085117 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Smith, Ian F. C. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91638-5">https://doi.org/10.1007/978-3-319-91638-5</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085523 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085290 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085538 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085729 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 &ndash; September 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085802 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Zikas, Vassilis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44618-9">https://doi.org/10.1007/978-3-319-44618-9</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085812 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Chen, Jiageng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46298-1">https://doi.org/10.1007/978-3-319-46298-1</a><br/>Format:&#160;Electronic Resources<br/> Testing Software and Systems 28th IFIP WG 6.1 International Conference, ICTSS 2016, Graz, Austria, October 17-19, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085441 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Wotawa, Franz. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47443-4">https://doi.org/10.1007/978-3-319-47443-4</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2&ndash;8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085744 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085745 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Karagiannis, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30505-9">https://doi.org/10.1007/978-3-319-30505-9</a><br/>Format:&#160;Electronic Resources<br/> Innovative Security Solutions for Information Technology and Communications 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085443 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Bica, Ion. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47238-6">https://doi.org/10.1007/978-3-319-47238-6</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085097 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Rome, Erich. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33331-1">https://doi.org/10.1007/978-3-319-33331-1</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085406 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Lambrinoudakis, Costas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31811-0">https://doi.org/10.1007/978-3-319-31811-0</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Services Science 5th International Conference, CLOSER 2015, Lisbon, Portugal, May 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084554 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Helfert, Markus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29582-4">https://doi.org/10.1007/978-3-319-29582-4</a><br/>Format:&#160;Electronic Resources<br/> Mathematical and Engineering Methods in Computer Science 10th International Doctoral Workshop, MEMICS 2015, Telč, Czech Republic, October 23&ndash;25, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085525 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Kofroň, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29817-7">https://doi.org/10.1007/978-3-319-29817-7</a><br/>Format:&#160;Electronic Resources<br/> Software Engineering for Resilient Systems 8th International Workshop, SERENE 2016, Gothenburg, Sweden, September 5-6, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085898 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Crnkovic, Ivica. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45892-2">https://doi.org/10.1007/978-3-319-45892-2</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 &ndash; December 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085698 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Lam, Kwok-Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50011-9">https://doi.org/10.1007/978-3-319-50011-9</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086006 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Bonakdarpour, Borzoo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49259-9">https://doi.org/10.1007/978-3-319-49259-9</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2086063 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format:&#160;Electronic Resources<br/> Web Services, Formal Methods, and Behavioral Types 11th International Workshop, WS-FM 2014, Eindhoven, The Netherlands, September 11-12, 2014, and 12th International Workshop, WS-FM/BEAT 2015, Madrid, Spain, September 4-5, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086078 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Hildebrandt, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33612-1">https://doi.org/10.1007/978-3-319-33612-1</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2086079 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086095 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format:&#160;Electronic Resources<br/> Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085986 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Badonnel, R&eacute;mi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39814-3">https://doi.org/10.1007/978-3-319-39814-3</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing 14th International Conference, ICSOC 2016, Banff, AB, Canada, October 10-13, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086003 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Sheng, Quan Z. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46295-0">https://doi.org/10.1007/978-3-319-46295-0</a><br/>Format:&#160;Electronic Resources<br/> Mobility Management Principle, Technology and Applications ent://SD_ILS/0/SD_ILS:2086565 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Chen, Shanzhi. author.<br/><a href="https://doi.org/10.1007/978-3-662-52726-9">https://doi.org/10.1007/978-3-662-52726-9</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7&ndash;9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:2085526 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing &ndash; ICSOC 2015 Workshops WESOA, RMSOC, ISC, DISCO, WESE, BSCI, FOR-MOVES, Goa, India, November 16-19, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085868 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Norta, Alex. editor.<br/><a href="https://doi.org/10.1007/978-3-662-50539-7">https://doi.org/10.1007/978-3-662-50539-7</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085726 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48965-0">https://doi.org/10.1007/978-3-319-48965-0</a><br/>Format:&#160;Electronic Resources<br/> Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084105 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085980 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Katsikas, Sokratis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44341-6">https://doi.org/10.1007/978-3-319-44341-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085887 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Ogawa, Kazuto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format:&#160;Electronic Resources<br/> Multiple Access Communications 9th International Workshop, MACOM 2016, Aalborg, Denmark, November 21-22, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085095 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Madsen, Tatiana K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51376-8">https://doi.org/10.1007/978-3-319-51376-8</a><br/>Format:&#160;Electronic Resources<br/> Wireless Algorithms, Systems, and Applications 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085840 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Yang, Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-42836-9">https://doi.org/10.1007/978-3-319-42836-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20&ndash;22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085953 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Kim, Ho-won. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31875-2">https://doi.org/10.1007/978-3-319-31875-2</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5&ndash;6, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085888 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format:&#160;Electronic Resources<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086126 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085428 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Monrose, Fabian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45719-2">https://doi.org/10.1007/978-3-319-45719-2</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:2085246 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48671-0">https://doi.org/10.1007/978-3-319-48671-0</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085086 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085256 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Gierlichs, Benedikt. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53140-2">https://doi.org/10.1007/978-3-662-53140-2</a><br/>Format:&#160;Electronic Resources<br/> System Analysis and Modeling. Technology-Specific Aspects of Models 9th International Conference, SAM 2016, Saint-Melo, France, October 3-4, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085087 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Grabowski, Jens. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46613-2">https://doi.org/10.1007/978-3-319-46613-2</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085089 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Zhu, Quanyan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47413-7">https://doi.org/10.1007/978-3-319-47413-7</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085036 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format:&#160;Electronic Resources<br/> Social, Cultural, and Behavioral Modeling 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28 - July 1, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085231 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Xu, Kevin S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39931-7">https://doi.org/10.1007/978-3-319-39931-7</a><br/>Format:&#160;Electronic Resources<br/> Modelling Foundations and Applications 12th European Conference, ECMFA 2016, Held as Part of STAF 2016, Vienna, Austria, July 6-7, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085820 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Wąsowski, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-319-42061-5">https://doi.org/10.1007/978-3-319-42061-5</a><br/>Format:&#160;Electronic Resources<br/> Data Science and Big Data Computing Frameworks and Methodologies ent://SD_ILS/0/SD_ILS:2084874 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31861-5">https://doi.org/10.1007/978-3-319-31861-5</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502812 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70567-3">http://dx.doi.org/10.1007/978-3-540-70567-3</a><br/>Format:&#160;Electronic Resources<br/> ECOOP 2008 &ndash; Object-Oriented Programming 22nd European Conference Paphos, Cyprus, July 7-11, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502820 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Vitek, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70592-5">http://dx.doi.org/10.1007/978-3-540-70592-5</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502730 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Rong, Chunming. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69295-9">http://dx.doi.org/10.1007/978-3-540-69295-9</a><br/>Format:&#160;Electronic Resources<br/> Object-Oriented Technology. ECOOP 2007 Workshop Reader ECOOP 2007 Workshops, Berlin, Germany, July 30-31, 2007, Final Reports ent://SD_ILS/0/SD_ILS:503335 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Cebulla, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78195-0">http://dx.doi.org/10.1007/978-3-540-78195-0</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography &ndash; PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503372 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format:&#160;Electronic Resources<br/> Emerging Web Services Technology, Volume II ent://SD_ILS/0/SD_ILS:503942 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Gschwind, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-7643-8864-5">http://dx.doi.org/10.1007/978-3-7643-8864-5</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503586 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format:&#160;Electronic Resources<br/> Resilient Networks and Services Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502818 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Hausheer, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70587-1">http://dx.doi.org/10.1007/978-3-540-70587-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502827 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format:&#160;Electronic Resources<br/> Software Technologies for Embedded and Ubiquitous Systems 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503719 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Brinkschulte, Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87785-1">http://dx.doi.org/10.1007/978-3-540-87785-1</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502803 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503660 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503664 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Grimaud, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format:&#160;Electronic Resources<br/> Managing Large-Scale Service Deployment 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503678 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Turck, Filip. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87353-2">http://dx.doi.org/10.1007/978-3-540-87353-2</a><br/>Format:&#160;Electronic Resources<br/> IP Operations and Management 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503680 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Akar, Nail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87357-0">http://dx.doi.org/10.1007/978-3-540-87357-0</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503789 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Solanki, Kaushal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format:&#160;Electronic Resources<br/> Web Services and Formal Methods 4th International Workshop, WS-FM 2007, Brisbane, Australia, September 28-29, 2007. Proceedings ent://SD_ILS/0/SD_ILS:503496 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79230-7">http://dx.doi.org/10.1007/978-3-540-79230-7</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502691 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Bellovin, Steven M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503533 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Pei, Dingyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502793 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format:&#160;Electronic Resources<br/> Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503375 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Bonchi, Francesco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78478-4">http://dx.doi.org/10.1007/978-3-540-78478-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503818 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Matsuura, Kanta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503821 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Franklin, Matthew K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503684 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Lippmann, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503832 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Chowdhury, Dipanwita Roy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89754-5">http://dx.doi.org/10.1007/978-3-540-89754-5</a><br/>Format:&#160;Electronic Resources<br/> Service Availability 5th International Service Availability Symposium, ISAS 2008 Tokyo, Japan, May 19-21, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502620 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Nanya, Takashi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68129-8">http://dx.doi.org/10.1007/978-3-540-68129-8</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2008 First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502623 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68164-9">http://dx.doi.org/10.1007/978-3-540-68164-9</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503610 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503649 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Furnell, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format:&#160;Electronic Resources<br/> Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502750 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503613 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85259-9">http://dx.doi.org/10.1007/978-3-540-85259-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503563 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Onieva, Jose A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format:&#160;Electronic Resources<br/> Modelling, Computation and Optimization in Information Systems and Management Sciences Second International Conference MCO 2008, Metz, France - Luxembourg, September 8-10, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503692 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Le Thi, Hoai An. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87477-5">http://dx.doi.org/10.1007/978-3-540-87477-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2008 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503455 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Smart, Nigel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78967-3">http://dx.doi.org/10.1007/978-3-540-78967-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503600 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Wagner, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503800 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, M&aacute;laga, Spain, October 6-8, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503749 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503753 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Buchmann, Johannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, M&aacute;laga, Spain, October 3-5, 2007. Revised Papers ent://SD_ILS/0/SD_ILS:503793 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503481 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2008 The Cryptographers&rsquo; Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503503 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79263-5">http://dx.doi.org/10.1007/978-3-540-79263-5</a><br/>Format:&#160;Electronic Resources<br/> Testing of Software and Communicating Systems 20th IFIP TC 6/WG 6.1 International Conference, TestCom 2008 8th International Workshop, FATES 2008 Tokyo, Japan, June 10-13, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502652 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Suzuki, Kenji. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68524-1">http://dx.doi.org/10.1007/978-3-540-68524-1</a><br/>Format:&#160;Electronic Resources<br/> Reliable Software Technologies &ndash; Ada-Europe 2008 13th Ada-Europe International Conference on Reliable Software Technologies, Venice, Italy, June 16-20, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502662 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Kordon, Fabrice. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68624-8">http://dx.doi.org/10.1007/978-3-540-68624-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Ad Hoc Networking Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25&ndash;27, 2008 ent://SD_ILS/0/SD_ILS:501523 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Cuenca, Pedro. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09490-8">http://dx.doi.org/10.1007/978-0-387-09490-8</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Collaborative Networks IFIP TC 5 WG 5.5 Ninth Working Conference on VIRTUAL ENTERPRISES, September 8-10, 2008, Poznan, Poland ent://SD_ILS/0/SD_ILS:501998 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Camarinha-Matos, Luis M. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-84837-2">http://dx.doi.org/10.1007/978-0-387-84837-2</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 7th International Conference, EGOV 2008, Turin, Italy, August 31 - September 5, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503605 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85204-9">http://dx.doi.org/10.1007/978-3-540-85204-9</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503805 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Kulkarni, Sandeep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89335-6">http://dx.doi.org/10.1007/978-3-540-89335-6</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503839 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503843 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Ortiz-Arroyo, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89900-6">http://dx.doi.org/10.1007/978-3-540-89900-6</a><br/>Format:&#160;Electronic Resources<br/> Network-Centric Service-Oriented Enterprise ent://SD_ILS/0/SD_ILS:507651 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Chang, William Y. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4020-6456-2">http://dx.doi.org/10.1007/978-1-4020-6456-2</a><br/>Format:&#160;Electronic Resources<br/> EC2ND 2006 Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Faculty of Advanced Technology, University of Glamorgan, Wales, UK ent://SD_ILS/0/SD_ILS:508664 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Blyth, Andrew. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-750-3">http://dx.doi.org/10.1007/978-1-84628-750-3</a><br/>Format:&#160;Electronic Resources<br/> Online Communities and Social Computing Second International Conference, OCSC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512623 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Schuler, Douglas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73257-0">http://dx.doi.org/10.1007/978-3-540-73257-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512761 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513007 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;McDaniel, Patrick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format:&#160;Electronic Resources<br/> Object-Oriented Technology. ECOOP 2006 Workshop Reader ECOOP 2006 Workshops, Nantes, France, July 3-7, 2006, Final Reports ent://SD_ILS/0/SD_ILS:512391 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;S&uuml;dholt, Mario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71774-4">http://dx.doi.org/10.1007/978-3-540-71774-4</a><br/>Format:&#160;Electronic Resources<br/> Managing Virtualization of Networks and Services 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San Jos&eacute;, CA, USA, October 29-31, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512933 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Clemm, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75694-1">http://dx.doi.org/10.1007/978-3-540-75694-1</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:512793 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Biham, Eli. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format:&#160;Electronic Resources<br/> IP Operations and Management 7th IEEE International Workshop, IPOM 2007 San Jos&eacute;, USA, October 31 - November 2, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512942 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Medhi, Deep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75853-2">http://dx.doi.org/10.1007/978-3-540-75853-2</a><br/>Format:&#160;Electronic Resources<br/> Active Networks IFIP TC6 6th International Working Conference, IWAN 2004, Lawrence, KS, USA, October 27-29, 2004. Revised Papers ent://SD_ILS/0/SD_ILS:512352 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Minden, Gary J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71500-9">http://dx.doi.org/10.1007/978-3-540-71500-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 &mdash; 26, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512846 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Biskup, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513032 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Adams, Carlisle. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512703 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;H&auml;mmerli, Bernhard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512991 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Bao, Feng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76969-9">http://dx.doi.org/10.1007/978-3-540-76969-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512492 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Naor, Moni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72540-4">http://dx.doi.org/10.1007/978-3-540-72540-4</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics: Biosurveillance Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May 22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512504 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Zeng, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72608-1">http://dx.doi.org/10.1007/978-3-540-72608-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512460 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Sauveron, Damien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512440 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Intrusion Detection 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512777 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Kruegel, Christopher. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74320-0">http://dx.doi.org/10.1007/978-3-540-74320-0</a><br/>Format:&#160;Electronic Resources<br/> Testing of Software and Communicating Systems 19th IFIP TC6/WG6.1 International Conference, TestCom 2007, 7th International Workshop, FATES 2007, Tallinn, Estonia, June 26-29, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512589 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Petrenko, Alexandre. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73066-8">http://dx.doi.org/10.1007/978-3-540-73066-8</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512888 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">http://dx.doi.org/10.1007/978-3-540-75227-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512986 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Kurosawa, Kaoru. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer Science &ndash; ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512989 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Cervesato, Iliano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512362 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71549-8">http://dx.doi.org/10.1007/978-3-540-71549-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512927 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Miyaji, Atsuko. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format:&#160;Electronic Resources<br/> Software Technologies for Embedded and Ubiquitous Systems 5th IFIP WG 10.2 International Workshop, SEUS 2007, Santorini Island, Greece, May 2007. Revised Papers ent://SD_ILS/0/SD_ILS:512928 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Obermaisser, Roman. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75664-4">http://dx.doi.org/10.1007/978-3-540-75664-4</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers ent://SD_ILS/0/SD_ILS:513033 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Hybrid Information Technology First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513034 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Szczuka, Marcin S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77368-9">http://dx.doi.org/10.1007/978-3-540-77368-9</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513035 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Furon, Teddy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77370-2">http://dx.doi.org/10.1007/978-3-540-77370-2</a><br/>Format:&#160;Electronic Resources<br/> ECOOP 2007 &ndash; Object-Oriented Programming 21st European Conference, Berlin, Germany, July 30 - August 3, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512699 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Ernst, Erik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73589-2">http://dx.doi.org/10.1007/978-3-540-73589-2</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512784 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 6th International Conference, EGOV 2007, Regensburg, Germany, September 3-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512788 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74444-3">http://dx.doi.org/10.1007/978-3-540-74444-3</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512889 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75248-6">http://dx.doi.org/10.1007/978-3-540-75248-6</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 9th International Symposium, SSS 2007 Paris, France, November 14-16, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512961 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Masuzawa, Toshimitsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76627-8">http://dx.doi.org/10.1007/978-3-540-76627-8</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512529 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512626 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design IV FOSAD 2006/2007 Tutorial Lectures ent://SD_ILS/0/SD_ILS:512837 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74810-6">http://dx.doi.org/10.1007/978-3-540-74810-6</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers ent://SD_ILS/0/SD_ILS:512756 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Camenisch, Jan L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512276 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Lee, Jae Kwang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format:&#160;Electronic Resources<br/> Inter-Domain Management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512572 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Bandara, Arosha K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72986-0">http://dx.doi.org/10.1007/978-3-540-72986-0</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513017 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77156-2">http://dx.doi.org/10.1007/978-3-540-77156-2</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security XXI 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512687 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Barker, Steve. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73538-0">http://dx.doi.org/10.1007/978-3-540-73538-0</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512690 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Xiao, Bin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73547-2">http://dx.doi.org/10.1007/978-3-540-73547-2</a><br/>Format:&#160;Electronic Resources<br/> E-Voting and Identity First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513040 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Alkassar, Ammar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77493-8">http://dx.doi.org/10.1007/978-3-540-77493-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513042 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Okada, Mitsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77505-8">http://dx.doi.org/10.1007/978-3-540-77505-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513043 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Kim, Sehun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77535-5">http://dx.doi.org/10.1007/978-3-540-77535-5</a><br/>Format:&#160;Electronic Resources<br/> Grid Computing Security ent://SD_ILS/0/SD_ILS:511672 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Chakrabarti, Anirban. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format:&#160;Electronic Resources<br/> Service Availability 4th International Service Availability Symposium, ISAS 2007, Durham, NH, USA, May 21-22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512528 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72736-1">http://dx.doi.org/10.1007/978-3-540-72736-1</a><br/>Format:&#160;Electronic Resources<br/> Reliable Software Technologies &ndash; Ada Europe 2007 12th Ada-Europe International Conference on Reliable Software Technologies, Geneva, Switzerland, June 25-29, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512621 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Abdennadher, Nabil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73230-3">http://dx.doi.org/10.1007/978-3-540-73230-3</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems - CHES 2007 9th International Workshop, Vienna, Austria, September 10-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512825 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Paillier, Pascal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74735-2">http://dx.doi.org/10.1007/978-3-540-74735-2</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers ent://SD_ILS/0/SD_ILS:512922 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography &ndash; PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512381 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Okamoto, Tatsuaki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512675 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512974 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Nam, Kil-Hyun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format:&#160;Electronic Resources<br/> Sustainable Internet Third Asian Internet Engineering Conference, AINTEC 2007, Phuket, Thailand, November 27-29, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512976 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Fdida, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76809-8">http://dx.doi.org/10.1007/978-3-540-76809-8</a><br/>Format:&#160;Electronic Resources<br/> Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512998 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Zhang, Hongke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2007 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512999 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Srinathan, K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77026-8">http://dx.doi.org/10.1007/978-3-540-77026-8</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513004 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format:&#160;Electronic Resources<br/> EC2ND 2005 Proceedings of the First European Conference on Computer Network Defence School of Computing, University of Glamorgan, Wales, UK ent://SD_ILS/0/SD_ILS:508531 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Blyth, Andrew. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-352-3">http://dx.doi.org/10.1007/1-84628-352-3</a><br/>Format:&#160;Electronic Resources<br/> Reliable Software Technologies &ndash; Ada-Europe 2006 11th Ada-Europe International Conference on Reliable Software Technologies, Porto, Portugal, June 5-9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511190 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Pinho, Lu&iacute;s Miguel. editor.<br/><a href="http://dx.doi.org/10.1007/11767077">http://dx.doi.org/10.1007/11767077</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511199 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11767480">http://dx.doi.org/10.1007/11767480</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511625 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11844662">http://dx.doi.org/10.1007/11844662</a><br/>Format:&#160;Electronic Resources<br/> Secure Mobile Ad-hoc Networks and Sensors First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:511574 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Burmester, Mike. editor.<br/><a href="http://dx.doi.org/10.1007/11801412">http://dx.doi.org/10.1007/11801412</a><br/>Format:&#160;Electronic Resources<br/> Large Scale Management of Distributed Systems 17th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2006, Dublin, Ireland, October 23-25, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511847 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;State, Radu. editor.<br/><a href="http://dx.doi.org/10.1007/11907466">http://dx.doi.org/10.1007/11907466</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:512125 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Bagchi, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papers ent://SD_ILS/0/SD_ILS:512135 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/11962977">http://dx.doi.org/10.1007/11962977</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Ad-Hoc and Sensor Networks Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512142 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Butty&aacute;n, Levente. editor.<br/><a href="http://dx.doi.org/10.1007/11964254">http://dx.doi.org/10.1007/11964254</a><br/>Format:&#160;Electronic Resources<br/> Technologies for Advanced Heterogeneous Networks II Second Asian Internet Engineering Conference, AINTEC 2006, Pathumthani, Thailand, November 28-30, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511955 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Cho, Kenjiro. editor.<br/><a href="http://dx.doi.org/10.1007/11930181">http://dx.doi.org/10.1007/11930181</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 8th International Symposium, SSS 2006, Dallas, TX, USA, November 17-19, 2006. Proceedings ent://SD_ILS/0/SD_ILS:512005 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Datta, Ajoy K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-49823-0">http://dx.doi.org/10.1007/978-3-540-49823-0</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511007 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/11745853">http://dx.doi.org/10.1007/11745853</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2005 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510916 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Won, Dong Ho. editor.<br/><a href="http://dx.doi.org/10.1007/11734727">http://dx.doi.org/10.1007/11734727</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510918 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Chen, Hsinchun. editor.<br/><a href="http://dx.doi.org/10.1007/11734628">http://dx.doi.org/10.1007/11734628</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510825 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Chen, Kefei. editor.<br/><a href="http://dx.doi.org/10.1007/11689522">http://dx.doi.org/10.1007/11689522</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:511208 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11767831">http://dx.doi.org/10.1007/11767831</a><br/>Format:&#160;Electronic Resources<br/> Trust and Privacy in Digital Business Third International Conference, TrustBus 2006, Krak&oacute;w, Poland, September 4-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511566 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Fischer-H&uuml;bner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/11824633">http://dx.doi.org/10.1007/11824633</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - CRYPTO 2006 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511499 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Dwork, Cynthia. editor.<br/><a href="http://dx.doi.org/10.1007/11818175">http://dx.doi.org/10.1007/11818175</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511857 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Leitold, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/11909033">http://dx.doi.org/10.1007/11909033</a><br/>Format:&#160;Electronic Resources<br/> Information Security 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511598 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Katsikas, Sokratis K. editor.<br/><a href="http://dx.doi.org/10.1007/11836810">http://dx.doi.org/10.1007/11836810</a><br/>Format:&#160;Electronic Resources<br/> Mobile Ad-hoc and Sensor Networks Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006. Proceedings ent://SD_ILS/0/SD_ILS:512015 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Cao, Jiannong. editor.<br/><a href="http://dx.doi.org/10.1007/11943952">http://dx.doi.org/10.1007/11943952</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512107 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11957454">http://dx.doi.org/10.1007/11957454</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - VIETCRYPT 2006 First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006. Revised Selected Papers ent://SD_ILS/0/SD_ILS:512110 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Nguyen, Phong Q. editor.<br/><a href="http://dx.doi.org/10.1007/11958239">http://dx.doi.org/10.1007/11958239</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:511773 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Crescenzo, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/11889663">http://dx.doi.org/10.1007/11889663</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology &ndash; ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511942 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Rhee, Min Surp. editor.<br/><a href="http://dx.doi.org/10.1007/11927587">http://dx.doi.org/10.1007/11927587</a><br/>Format:&#160;Electronic Resources<br/> Software Engineering Research and Applications Second International Conference, SERA 2004, Los Angeles, CA, USA, MAY 5-7, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510489 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Dosch, Walter. editor.<br/><a href="http://dx.doi.org/10.1007/11668855">http://dx.doi.org/10.1007/11668855</a><br/>Format:&#160;Electronic Resources<br/> Emerging Trends in Information and Communication Security International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511182 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;M&uuml;ller, G&uuml;nter. editor.<br/><a href="http://dx.doi.org/10.1007/11766155">http://dx.doi.org/10.1007/11766155</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security XX 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511421 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Damiani, Ernesto. editor.<br/><a href="http://dx.doi.org/10.1007/11805588">http://dx.doi.org/10.1007/11805588</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510843 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/11693383">http://dx.doi.org/10.1007/11693383</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510851 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Song, Joo-Seok. editor.<br/><a href="http://dx.doi.org/10.1007/11604938">http://dx.doi.org/10.1007/11604938</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511137 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Mehrotra, Sharad. editor.<br/><a href="http://dx.doi.org/10.1007/11760146">http://dx.doi.org/10.1007/11760146</a><br/>Format:&#160;Electronic Resources<br/> Trust Management 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511090 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;St&oslash;len, Ketil. editor.<br/><a href="http://dx.doi.org/10.1007/11755593">http://dx.doi.org/10.1007/11755593</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - EUROCRYPT 2006 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511160 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/11761679">http://dx.doi.org/10.1007/11761679</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511614 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Yang, Laurence T. editor.<br/><a href="http://dx.doi.org/10.1007/11839569">http://dx.doi.org/10.1007/11839569</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware &amp; Vulnerability Assessment Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511345 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;B&uuml;schkes, Roland. editor.<br/><a href="http://dx.doi.org/10.1007/11790754">http://dx.doi.org/10.1007/11790754</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:511663 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11861386">http://dx.doi.org/10.1007/11861386</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510908 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/11733447">http://dx.doi.org/10.1007/11733447</a><br/>Format:&#160;Electronic Resources<br/> Security in Pervasive Computing Third International Conference, SPC 2006, York, UK, April 18-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510920 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Clark, John A. editor.<br/><a href="http://dx.doi.org/10.1007/11734666">http://dx.doi.org/10.1007/11734666</a><br/>Format:&#160;Electronic Resources<br/> ECOOP 2006 &ndash; Object-Oriented Programming 20th European Conference, Nantes, France, July 3-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511313 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Thomas, Dave. editor.<br/><a href="http://dx.doi.org/10.1007/11785477">http://dx.doi.org/10.1007/11785477</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects in Security and Trust Thrid International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510720 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/11679219">http://dx.doi.org/10.1007/11679219</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2006 The Cryptographers&rsquo; Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510726 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/11605805">http://dx.doi.org/10.1007/11605805</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Intrusion Detection 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:510179 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Valdes, Alfonso. editor.<br/><a href="http://dx.doi.org/10.1007/11663812">http://dx.doi.org/10.1007/11663812</a><br/>Format:&#160;Electronic Resources<br/> Service Availability Third International Service Availability Symposium, ISAS 2006, Helsinki, Finland, May 15-16, 2006. Revised Selected Papers ent://SD_ILS/0/SD_ILS:512093 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Penkler, Dave. editor.<br/><a href="http://dx.doi.org/10.1007/11955498">http://dx.doi.org/10.1007/11955498</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511278 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Batten, Lynn Margaret. editor.<br/><a href="http://dx.doi.org/10.1007/11780656">http://dx.doi.org/10.1007/11780656</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems - CHES 2006 8th International Workshop, Yokohama, Japan, October 10-13, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511817 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Goubin, Louis. editor.<br/><a href="http://dx.doi.org/10.1007/11894063">http://dx.doi.org/10.1007/11894063</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511967 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Ning, Peng. editor.<br/><a href="http://dx.doi.org/10.1007/11935308">http://dx.doi.org/10.1007/11935308</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511586 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Prisco, Roberto. editor.<br/><a href="http://dx.doi.org/10.1007/11832072">http://dx.doi.org/10.1007/11832072</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511852 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Yoshiura, Hiroshi. editor.<br/><a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format:&#160;Electronic Resources<br/> Autonomic Principles of IP Operations and Management 6th IEEE International Workshop on IP Operations and Management, IPOM 2006, Dublin, Ireland, October 23-25, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511853 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Parr, Gerard. editor.<br/><a href="http://dx.doi.org/10.1007/11908852">http://dx.doi.org/10.1007/11908852</a><br/>Format:&#160;Electronic Resources<br/> Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511771 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Breveglieri, Luca. editor.<br/><a href="http://dx.doi.org/10.1007/11889700">http://dx.doi.org/10.1007/11889700</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511983 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Lipmaa, Helger. editor.<br/><a href="http://dx.doi.org/10.1007/11937807">http://dx.doi.org/10.1007/11937807</a><br/>Format:&#160;Electronic Resources<br/> Digital Rights Management. Technologies, Issues, Challenges and Systems First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:511342 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/11787952">http://dx.doi.org/10.1007/11787952</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Intrusion Detection 9th International Symposium, RAID 2006 Hamburg, Germany, September 20-22, 2006 Proceedings ent://SD_ILS/0/SD_ILS:511652 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/11856214">http://dx.doi.org/10.1007/11856214</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 5th International Conference, EGOV 2006, Krak&oacute;w, Poland, September 4-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511544 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/11823100">http://dx.doi.org/10.1007/11823100</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511681 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Gollmann, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/11863908">http://dx.doi.org/10.1007/11863908</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511961 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/11935070">http://dx.doi.org/10.1007/11935070</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511966 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Lai, Xuejia. editor.<br/><a href="http://dx.doi.org/10.1007/11935230">http://dx.doi.org/10.1007/11935230</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2007 The Cryptographers&rsquo; Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512153 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Abe, Masayuki. editor.<br/><a href="http://dx.doi.org/10.1007/11967668">http://dx.doi.org/10.1007/11967668</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - INDOCRYPT 2006 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings ent://SD_ILS/0/SD_ILS:512000 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Barua, Rana. editor.<br/><a href="http://dx.doi.org/10.1007/11941378">http://dx.doi.org/10.1007/11941378</a><br/>Format:&#160;Electronic Resources<br/> Information Security 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510302 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11556992">http://dx.doi.org/10.1007/11556992</a><br/>Format:&#160;Electronic Resources<br/> Data Management in a Connected World Essays Dedicated to Hartmut Wedekind on the Occasion of His 70th Birthday ent://SD_ILS/0/SD_ILS:510110 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;H&auml;rder, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/b137346">http://dx.doi.org/10.1007/b137346</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509671 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Fridrich, Jessica. editor.<br/><a href="http://dx.doi.org/10.1007/b104759">http://dx.doi.org/10.1007/b104759</a><br/>Format:&#160;Electronic Resources<br/> Reliable Software Technology &ndash; Ada-Europe 2005 10th Ada-Europe International Conference on Reliable Software Technologies, York, UK, June 20-24, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510119 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Vardanega, Tullio. editor.<br/><a href="http://dx.doi.org/10.1007/b137344">http://dx.doi.org/10.1007/b137344</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - INDOCRYPT 2004 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004. Proceedings ent://SD_ILS/0/SD_ILS:509738 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Canteaut, Anne. editor.<br/><a href="http://dx.doi.org/10.1007/b104579">http://dx.doi.org/10.1007/b104579</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; Mycrypt 2005 First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510427 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/11554868">http://dx.doi.org/10.1007/11554868</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510648 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510650 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Feng, Dengguo. editor.<br/><a href="http://dx.doi.org/10.1007/11599548">http://dx.doi.org/10.1007/11599548</a><br/>Format:&#160;Electronic Resources<br/> Human Interactive Proofs Second International Workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510475 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Baird, Henry S. editor.<br/><a href="http://dx.doi.org/10.1007/b136509">http://dx.doi.org/10.1007/b136509</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2005 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510253 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Shoup, Victor. editor.<br/><a href="http://dx.doi.org/10.1007/11535218">http://dx.doi.org/10.1007/11535218</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:509964 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Barni, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/11558859">http://dx.doi.org/10.1007/11558859</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design III FOSAD 2004/2005 Tutorial Lectures ent://SD_ILS/0/SD_ILS:510308 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/11554578">http://dx.doi.org/10.1007/11554578</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510309 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11535706">http://dx.doi.org/10.1007/11535706</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2005 7th International Workshop, Edinburgh, UK, August 29 &ndash; September 1, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510312 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Rao, Josyula R. editor.<br/><a href="http://dx.doi.org/10.1007/11545262">http://dx.doi.org/10.1007/11545262</a><br/>Format:&#160;Electronic Resources<br/> Security in Communication Networks 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509770 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Blundo, Carlo. editor.<br/><a href="http://dx.doi.org/10.1007/b105083">http://dx.doi.org/10.1007/b105083</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510135 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Boyd, Colin. editor.<br/><a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology &ndash; ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510443 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Park, Choon-sik. editor.<br/><a href="http://dx.doi.org/10.1007/b137120">http://dx.doi.org/10.1007/b137120</a><br/>Format:&#160;Electronic Resources<br/> Mobile Ad-hoc and Sensor Networks First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510552 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Jia, Xiaohua. editor.<br/><a href="http://dx.doi.org/10.1007/11599463">http://dx.doi.org/10.1007/11599463</a><br/>Format:&#160;Electronic Resources<br/> Embedded Systems Design The ARTIST Roadmap for Research and Development ent://SD_ILS/0/SD_ILS:510343 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Bouyssounouse, Bruno. author.<br/><a href="http://dx.doi.org/10.1007/b106761">http://dx.doi.org/10.1007/b106761</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510344 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11552338">http://dx.doi.org/10.1007/11552338</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 &ndash; 21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510348 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Dittmann, Jana. editor.<br/><a href="http://dx.doi.org/10.1007/11552055">http://dx.doi.org/10.1007/11552055</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2005 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510418 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/b136415">http://dx.doi.org/10.1007/b136415</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510424 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Kantor, Paul. editor.<br/><a href="http://dx.doi.org/10.1007/b136511">http://dx.doi.org/10.1007/b136511</a><br/>Format:&#160;Electronic Resources<br/> ECOOP 2005 - Object-Oriented Programming 19th European Conference, Glasgow, UK, July 25-29, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510154 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Black, Andrew P. editor.<br/><a href="http://dx.doi.org/10.1007/11531142">http://dx.doi.org/10.1007/11531142</a><br/>Format:&#160;Electronic Resources<br/> Technologies for Advanced Heterogeneous Networks First Asian Internet Engineering Conference, AINTEC 2005, Bangkok, Thailand, December 13-15, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510566 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Cho, Kenjiro. editor.<br/><a href="http://dx.doi.org/10.1007/11599593">http://dx.doi.org/10.1007/11599593</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510572 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Desmedt, Yvo G. editor.<br/><a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy, and Security in Digital Business Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510186 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/11537878">http://dx.doi.org/10.1007/11537878</a><br/>Format:&#160;Electronic Resources<br/> Web and Communication Technologies and Internet-Related Social Issues - HSI 2005 3rd International Conference on Human.Society@Internet, Tokyo, Japan, July 27-29, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510192 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Shimojo, Shinji. editor.<br/><a href="http://dx.doi.org/10.1007/11527725">http://dx.doi.org/10.1007/11527725</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510199 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Lim, Chae Hoon. editor.<br/><a href="http://dx.doi.org/10.1007/b103174">http://dx.doi.org/10.1007/b103174</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Ad-hoc and Sensor Networks Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:510087 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Molva, Refik. editor.<br/><a href="http://dx.doi.org/10.1007/11601494">http://dx.doi.org/10.1007/11601494</a><br/>Format:&#160;Electronic Resources<br/> E-government and Public Sector Process Rebuilding Dilettantes, Wheel Barrows, and Diamonds ent://SD_ILS/0/SD_ILS:507688 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Andersen, Kim Viborg. author.<br/><a href="http://dx.doi.org/10.1007/b116842">http://dx.doi.org/10.1007/b116842</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 &ndash; March 3, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:510132 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Patrick, Andrew S. editor.<br/><a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:510331 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Martin, David. editor.<br/><a href="http://dx.doi.org/10.1007/b136164">http://dx.doi.org/10.1007/b136164</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 4th International Conference, EGOV 2005, Copenhagen, Denmark, August 22-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510163 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/11545156">http://dx.doi.org/10.1007/11545156</a><br/>Format:&#160;Electronic Resources<br/> Operations and Management in IP-Based Networks 5th IEEE International Workshop on IP Operations and Management, IPOM 2005, Barcelona, Spain, October 26-28, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510456 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Magedanz, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/11567486">http://dx.doi.org/10.1007/11567486</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510364 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Gorodetsky, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format:&#160;Electronic Resources<br/> Ambient Networks 16th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2005, Barcelona, Spain, October 24-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510520 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Sch&ouml;nw&auml;lder, J&uuml;rgen. editor.<br/><a href="http://dx.doi.org/10.1007/11568285">http://dx.doi.org/10.1007/11568285</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510543 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Roy, Bimal. editor.<br/><a href="http://dx.doi.org/10.1007/11593447">http://dx.doi.org/10.1007/11593447</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - INDOCRYPT 2005 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510554 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Maitra, Subhamoy. editor.<br/><a href="http://dx.doi.org/10.1007/11596219">http://dx.doi.org/10.1007/11596219</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510349 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510351 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Vimercati, Sabrina de Capitani. editor.<br/><a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510459 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/11602897">http://dx.doi.org/10.1007/11602897</a><br/>Format:&#160;Electronic Resources<br/> Self-Stabilizing Systems 7th International Symposium, SSS 2005, Barcelona, Spain, October 26-27, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510479 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Tixeuil, S&eacute;bastien. editor.<br/><a href="http://dx.doi.org/10.1007/11577327">http://dx.doi.org/10.1007/11577327</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510219 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11542322">http://dx.doi.org/10.1007/11542322</a><br/>Format:&#160;Electronic Resources<br/> Scenarios: Models, Transformations and Tools International Workshop, Dagstuhl Castle, Germany, September 7-12, 2003, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510395 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Leue, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/b137052">http://dx.doi.org/10.1007/b137052</a><br/>Format:&#160;Electronic Resources<br/> Security in Pervasive Computing Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510370 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Hutter, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/b135497">http://dx.doi.org/10.1007/b135497</a><br/>Format:&#160;Electronic Resources<br/> Audio- and Video-Based Biometric Person Authentication 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510099 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Kanade, Takeo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-31638-1">http://dx.doi.org/10.1007/978-3-540-31638-1</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510103 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Julisch, Klaus. editor.<br/><a href="http://dx.doi.org/10.1007/b137798">http://dx.doi.org/10.1007/b137798</a><br/>Format:&#160;Electronic Resources<br/> Service Availability Second International Service Availability Symposium, ISAS 2005, Berlin, Germany, April 25 &ndash; 26, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510383 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/11560333">http://dx.doi.org/10.1007/11560333</a><br/>Format:&#160;Electronic Resources<br/> Trust Management Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510403 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Herrmann, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/b136639">http://dx.doi.org/10.1007/b136639</a><br/>Format:&#160;Electronic Resources<br/> Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509717 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Castelluccia, Claude. editor.<br/><a href="http://dx.doi.org/10.1007/b105219">http://dx.doi.org/10.1007/b105219</a><br/>Format:&#160;Electronic Resources<br/> Quality of Service &ndash; IWQoS 2005 13th International Workshop, IWQoS 2005, Passau, Germany, June 21-23, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510114 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Meer, Hermann. editor.<br/><a href="http://dx.doi.org/10.1007/b137286">http://dx.doi.org/10.1007/b137286</a><br/>Format:&#160;Electronic Resources<br/> Service Availability First International Service Availability Symposium, ISAS 2004, Munich, Germany, May 13-14, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509684 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/b105309">http://dx.doi.org/10.1007/b105309</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510020 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Ioannidis, John. editor.<br/><a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509743 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Handschuh, Helena. editor.<br/><a href="http://dx.doi.org/10.1007/b105103">http://dx.doi.org/10.1007/b105103</a><br/>Format:&#160;Electronic Resources<br/> Quality of Service in Multiservice IP Networks Third International Workshop, QoS-IP 2005, Catania, Italy, February 2-4, 2004, Catania, Italy, February 2-4, 2004. Proceedings ent://SD_ILS/0/SD_ILS:509751 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Ajmone Marsan, Marco. editor.<br/><a href="http://dx.doi.org/10.1007/b105169">http://dx.doi.org/10.1007/b105169</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2005 The Cryptographers&rsquo; Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509752 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/b105222">http://dx.doi.org/10.1007/b105222</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509757 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security ent://SD_ILS/0/SD_ILS:504373 2024-06-13T14:51:44Z 2024-06-13T14:51:44Z by&#160;Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format:&#160;Electronic Resources<br/>