Search Results for - Narrowed by: Management of Computing and Information Systems. - Information Storage and Retrieval.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026qf$003dSUBJECT$002509Subject$002509Information$002bStorage$002band$002bRetrieval.$002509Information$002bStorage$002band$002bRetrieval.$0026ps$003d300?2024-05-24T01:25:39ZData Privacy Gamesent://SD_ILS/0/SD_ILS:20845012024-05-24T01:25:39Z2024-05-24T01:25:39Zby Xu, Lei. author.<br/><a href="https://doi.org/10.1007/978-3-319-77965-2">https://doi.org/10.1007/978-3-319-77965-2</a><br/>Format: Electronic Resources<br/>Semantic Applications Methodology, Technology, Corporate Useent://SD_ILS/0/SD_ILS:20844512024-05-24T01:25:39Z2024-05-24T01:25:39Zby Hoppe, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-55433-3">https://doi.org/10.1007/978-3-662-55433-3</a><br/>Format: Electronic Resources<br/>Information Literacy in the Workplace 5th European Conference, ECIL 2017, Saint Malo, France, September 18-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847982024-05-24T01:25:39Z2024-05-24T01:25:39Zby Kurbanoğlu, Serap. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74334-9">https://doi.org/10.1007/978-3-319-74334-9</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854432024-05-24T01:25:39Z2024-05-24T01:25:39Zby Bica, Ion. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47238-6">https://doi.org/10.1007/978-3-319-47238-6</a><br/>Format: Electronic Resources<br/>Business Process Management 14th International Conference, BPM 2016, Rio de Janeiro, Brazil, September 18-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20857682024-05-24T01:25:39Z2024-05-24T01:25:39Zby La Rosa, Marcello. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45348-4">https://doi.org/10.1007/978-3-319-45348-4</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860662024-05-24T01:25:39Z2024-05-24T01:25:39Zby Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48057-2">https://doi.org/10.1007/978-3-319-48057-2</a><br/>Format: Electronic Resources<br/>Model and Data Engineering 6th International Conference, MEDI 2016, Almería, Spain, September 21-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856142024-05-24T01:25:39Z2024-05-24T01:25:39Zby Bellatreche, Ladjel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45547-1">https://doi.org/10.1007/978-3-319-45547-1</a><br/>Format: Electronic Resources<br/>Requirements Engineering: Foundation for Software Quality 22nd International Working Conference, REFSQ 2016, Gothenburg, Sweden, March 14-17, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857012024-05-24T01:25:39Z2024-05-24T01:25:39Zby Daneva, Maya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30282-9">https://doi.org/10.1007/978-3-319-30282-9</a><br/>Format: Electronic Resources<br/>Service-Oriented and Cloud Computing 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850822024-05-24T01:25:39Z2024-05-24T01:25:39Zby Aiello, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44482-6">https://doi.org/10.1007/978-3-319-44482-6</a><br/>Format: Electronic Resources<br/>System Analysis and Modeling. Technology-Specific Aspects of Models 9th International Conference, SAM 2016, Saint-Melo, France, October 3-4, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20850872024-05-24T01:25:39Z2024-05-24T01:25:39Zby Grabowski, Jens. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46613-2">https://doi.org/10.1007/978-3-319-46613-2</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861532024-05-24T01:25:39Z2024-05-24T01:25:39Zby Tryfonas, Theo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39381-0">https://doi.org/10.1007/978-3-319-39381-0</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data and Processes 6th International Provenance and Annotation Workshop, IPAW 2016, McLean, VA, USA, June 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859962024-05-24T01:25:39Z2024-05-24T01:25:39Zby Mattoso, Marta. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40593-3">https://doi.org/10.1007/978-3-319-40593-3</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing 14th International Conference, ICSOC 2016, Banff, AB, Canada, October 10-13, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860032024-05-24T01:25:39Z2024-05-24T01:25:39Zby Sheng, Quan Z. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46295-0">https://doi.org/10.1007/978-3-319-46295-0</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data and Processes Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake City, UT, USA, June 17-18, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5038462024-05-24T01:25:39Z2024-05-24T01:25:39Zby Freire, Juliana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89965-5">http://dx.doi.org/10.1007/978-3-540-89965-5</a><br/>Format: Electronic Resources<br/>Service Availability 5th International Service Availability Symposium, ISAS 2008 Tokyo, Japan, May 19-21, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026202024-05-24T01:25:39Z2024-05-24T01:25:39Zby Nanya, Takashi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68129-8">http://dx.doi.org/10.1007/978-3-540-68129-8</a><br/>Format: Electronic Resources<br/>Managing Large-Scale Service Deployment 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036782024-05-24T01:25:39Z2024-05-24T01:25:39Zby Turck, Filip. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87353-2">http://dx.doi.org/10.1007/978-3-540-87353-2</a><br/>Format: Electronic Resources<br/>Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036132024-05-24T01:25:39Z2024-05-24T01:25:39Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85259-9">http://dx.doi.org/10.1007/978-3-540-85259-9</a><br/>Format: Electronic Resources<br/>Business Process Management 6th International Conference, BPM 2008, Milan, Italy, September 2-4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036502024-05-24T01:25:39Z2024-05-24T01:25:39Zby Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85758-7">http://dx.doi.org/10.1007/978-3-540-85758-7</a><br/>Format: Electronic Resources<br/>Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038392024-05-24T01:25:39Z2024-05-24T01:25:39Zby Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5034812024-05-24T01:25:39Z2024-05-24T01:25:39Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format: Electronic Resources<br/>Advanced Methods for Inconsistent Knowledge Managementent://SD_ILS/0/SD_ILS:5024342024-05-24T01:25:39Z2024-05-24T01:25:39Zby Nguyen, Ngoc Thanh. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-889-0">http://dx.doi.org/10.1007/978-1-84628-889-0</a><br/>Format: Electronic Resources<br/>Software Technologies for Embedded and Ubiquitous Systems 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037192024-05-24T01:25:39Z2024-05-24T01:25:39Zby Brinkschulte, Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87785-1">http://dx.doi.org/10.1007/978-3-540-87785-1</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028272024-05-24T01:25:39Z2024-05-24T01:25:39Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format: Electronic Resources<br/>Resilient Networks and Services Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028182024-05-24T01:25:39Z2024-05-24T01:25:39Zby Hausheer, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70587-1">http://dx.doi.org/10.1007/978-3-540-70587-1</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027562024-05-24T01:25:39Z2024-05-24T01:25:39Zby Mjølsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69485-4">http://dx.doi.org/10.1007/978-3-540-69485-4</a><br/>Format: Electronic Resources<br/>Active Networks IFIP TC6 6th International Working Conference, IWAN 2004, Lawrence, KS, USA, October 27-29, 2004. Revised Papersent://SD_ILS/0/SD_ILS:5123522024-05-24T01:25:39Z2024-05-24T01:25:39Zby Minden, Gary J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71500-9">http://dx.doi.org/10.1007/978-3-540-71500-9</a><br/>Format: Electronic Resources<br/>Business Process Management 5th International Conference, BPM 2007, Brisbane, Australia, September 24-28, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128802024-05-24T01:25:39Z2024-05-24T01:25:39Zby Alonso, Gustavo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75183-0">http://dx.doi.org/10.1007/978-3-540-75183-0</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5128882024-05-24T01:25:39Z2024-05-24T01:25:39Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">http://dx.doi.org/10.1007/978-3-540-75227-1</a><br/>Format: Electronic Resources<br/>Secure Data Management 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128892024-05-24T01:25:39Z2024-05-24T01:25:39Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75248-6">http://dx.doi.org/10.1007/978-3-540-75248-6</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papersent://SD_ILS/0/SD_ILS:5129222024-05-24T01:25:39Z2024-05-24T01:25:39Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format: Electronic Resources<br/>Business Information Systems 10th International Conference, BIS 2007, Poznan, Poland, April 25-27, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124292024-05-24T01:25:39Z2024-05-24T01:25:39Zby Abramowicz, Witold. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72035-5">http://dx.doi.org/10.1007/978-3-540-72035-5</a><br/>Format: Electronic Resources<br/>Business Intelligence for the Real-Time Enterprises First International Workshop, BIRTE 2006, Seoul, Korea, September 11, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5127392024-05-24T01:25:39Z2024-05-24T01:25:39Zby Bussler, Christoph. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73950-0">http://dx.doi.org/10.1007/978-3-540-73950-0</a><br/>Format: Electronic Resources<br/>Preserving Digital Informationent://SD_ILS/0/SD_ILS:5115792024-05-24T01:25:39Z2024-05-24T01:25:39Zby Gladney, Henry M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-37887-7">http://dx.doi.org/10.1007/978-3-540-37887-7</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5123622024-05-24T01:25:39Z2024-05-24T01:25:39Zby Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71549-8">http://dx.doi.org/10.1007/978-3-540-71549-8</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126602024-05-24T01:25:39Z2024-05-24T01:25:39Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73408-6">http://dx.doi.org/10.1007/978-3-540-73408-6</a><br/>Format: Electronic Resources<br/>Computational Intelligence and Security International Conference, CIS 2006. Guangzhou, China, November 3-6, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:5127822024-05-24T01:25:39Z2024-05-24T01:25:39Zby Wang, Yuping. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74377-4">http://dx.doi.org/10.1007/978-3-540-74377-4</a><br/>Format: Electronic Resources<br/>IP Operations and Management 7th IEEE International Workshop, IPOM 2007 San José, USA, October 31 - November 2, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129422024-05-24T01:25:39Z2024-05-24T01:25:39Zby Medhi, Deep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75853-2">http://dx.doi.org/10.1007/978-3-540-75853-2</a><br/>Format: Electronic Resources<br/>Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130072024-05-24T01:25:39Z2024-05-24T01:25:39Zby McDaniel, Patrick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format: Electronic Resources<br/>Inter-Domain Management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125722024-05-24T01:25:39Z2024-05-24T01:25:39Zby Bandara, Arosha K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72986-0">http://dx.doi.org/10.1007/978-3-540-72986-0</a><br/>Format: Electronic Resources<br/>EC2ND 2006 Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Faculty of Advanced Technology, University of Glamorgan, Wales, UKent://SD_ILS/0/SD_ILS:5086642024-05-24T01:25:39Z2024-05-24T01:25:39Zby Blyth, Andrew. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-750-3">http://dx.doi.org/10.1007/978-1-84628-750-3</a><br/>Format: Electronic Resources<br/>Software Technologies for Embedded and Ubiquitous Systems 5th IFIP WG 10.2 International Workshop, SEUS 2007, Santorini Island, Greece, May 2007. Revised Papersent://SD_ILS/0/SD_ILS:5129282024-05-24T01:25:39Z2024-05-24T01:25:39Zby Obermaisser, Roman. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75664-4">http://dx.doi.org/10.1007/978-3-540-75664-4</a><br/>Format: Electronic Resources<br/>Service Availability 4th International Service Availability Symposium, ISAS 2007, Durham, NH, USA, May 21-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125282024-05-24T01:25:39Z2024-05-24T01:25:39Zby Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72736-1">http://dx.doi.org/10.1007/978-3-540-72736-1</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124402024-05-24T01:25:39Z2024-05-24T01:25:39Zby Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format: Electronic Resources<br/>Service Availability Third International Service Availability Symposium, ISAS 2006, Helsinki, Finland, May 15-16, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:5120932024-05-24T01:25:39Z2024-05-24T01:25:39Zby Penkler, Dave. editor.<br/><a href="http://dx.doi.org/10.1007/11955498">http://dx.doi.org/10.1007/11955498</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5112082024-05-24T01:25:39Z2024-05-24T01:25:39Zby Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11767831">http://dx.doi.org/10.1007/11767831</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust Thrid International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5107202024-05-24T01:25:39Z2024-05-24T01:25:39Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/11679219">http://dx.doi.org/10.1007/11679219</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5108252024-05-24T01:25:39Z2024-05-24T01:25:39Zby Chen, Kefei. editor.<br/><a href="http://dx.doi.org/10.1007/11689522">http://dx.doi.org/10.1007/11689522</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5109182024-05-24T01:25:39Z2024-05-24T01:25:39Zby Chen, Hsinchun. editor.<br/><a href="http://dx.doi.org/10.1007/11734628">http://dx.doi.org/10.1007/11734628</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006. Proceedings, Part Ient://SD_ILS/0/SD_ILS:5118122024-05-24T01:25:39Z2024-05-24T01:25:39Zby Gabrys, Bogdan. editor.<br/><a href="http://dx.doi.org/10.1007/11892960">http://dx.doi.org/10.1007/11892960</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006. Proceedings, Part IIent://SD_ILS/0/SD_ILS:5118132024-05-24T01:25:39Z2024-05-24T01:25:39Zby Gabrys, Bogdan. editor.<br/><a href="http://dx.doi.org/10.1007/11893004">http://dx.doi.org/10.1007/11893004</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006. Proceedings, Part IIIent://SD_ILS/0/SD_ILS:5118142024-05-24T01:25:39Z2024-05-24T01:25:39Zby Gabrys, Bogdan. editor.<br/><a href="http://dx.doi.org/10.1007/11893011">http://dx.doi.org/10.1007/11893011</a><br/>Format: Electronic Resources<br/>Business Process Management Workshops BPM 2006 International Workshops, BPD, BPI, ENEI, GPWW, DPM, semantics4ws, Vienna, Austria, September 4-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116022024-05-24T01:25:39Z2024-05-24T01:25:39Zby Eder, Johann. editor.<br/><a href="http://dx.doi.org/10.1007/11837862">http://dx.doi.org/10.1007/11837862</a><br/>Format: Electronic Resources<br/>Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5121252024-05-24T01:25:39Z2024-05-24T01:25:39Zby Bagchi, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format: Electronic Resources<br/>Autonomic Principles of IP Operations and Management 6th IEEE International Workshop on IP Operations and Management, IPOM 2006, Dublin, Ireland, October 23-25, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118532024-05-24T01:25:39Z2024-05-24T01:25:39Zby Parr, Gerard. editor.<br/><a href="http://dx.doi.org/10.1007/11908852">http://dx.doi.org/10.1007/11908852</a><br/>Format: Electronic Resources<br/>Designing Smart Homes The Role of Artificial Intelligenceent://SD_ILS/0/SD_ILS:5113412024-05-24T01:25:39Z2024-05-24T01:25:39Zby Augusto, Juan Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/11788485">http://dx.doi.org/10.1007/11788485</a><br/>Format: Electronic Resources<br/>Trust Management 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5110902024-05-24T01:25:39Z2024-05-24T01:25:39Zby Stølen, Ketil. editor.<br/><a href="http://dx.doi.org/10.1007/11755593">http://dx.doi.org/10.1007/11755593</a><br/>Format: Electronic Resources<br/>Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5117712024-05-24T01:25:39Z2024-05-24T01:25:39Zby Breveglieri, Luca. editor.<br/><a href="http://dx.doi.org/10.1007/11889700">http://dx.doi.org/10.1007/11889700</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data International Provenance and Annotation Workshop, IPAW 2006, Chicago, IL, USA, May 3-5, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5117812024-05-24T01:25:39Z2024-05-24T01:25:39Zby Moreau, Luc. editor.<br/><a href="http://dx.doi.org/10.1007/11890850">http://dx.doi.org/10.1007/11890850</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5121072024-05-24T01:25:39Z2024-05-24T01:25:39Zby Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11957454">http://dx.doi.org/10.1007/11957454</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111372024-05-24T01:25:39Z2024-05-24T01:25:39Zby Mehrotra, Sharad. editor.<br/><a href="http://dx.doi.org/10.1007/11760146">http://dx.doi.org/10.1007/11760146</a><br/>Format: Electronic Resources<br/>EC2ND 2005 Proceedings of the First European Conference on Computer Network Defence School of Computing, University of Glamorgan, Wales, UKent://SD_ILS/0/SD_ILS:5085312024-05-24T01:25:39Z2024-05-24T01:25:39Zby Blyth, Andrew. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-352-3">http://dx.doi.org/10.1007/1-84628-352-3</a><br/>Format: Electronic Resources<br/>Business Process Management Workshops BPM 2005 International Workshops, BPI, BPD, ENEI, BPRM, WSCOBPM, BPS, Nancy, France, September 5, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5107092024-05-24T01:25:39Z2024-05-24T01:25:39Zby Bussler, Christoph J. editor.<br/><a href="http://dx.doi.org/10.1007/11678564">http://dx.doi.org/10.1007/11678564</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5112442024-05-24T01:25:39Z2024-05-24T01:25:39Zby Atzeni, Andrea S. editor.<br/><a href="http://dx.doi.org/10.1007/11774716">http://dx.doi.org/10.1007/11774716</a><br/>Format: Electronic Resources<br/>Business Process Management 4th International Conference, BPM 2006, Vienna, Austria, September 5-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116232024-05-24T01:25:39Z2024-05-24T01:25:39Zby Dustdar, Schahram. editor.<br/><a href="http://dx.doi.org/10.1007/11841760">http://dx.doi.org/10.1007/11841760</a><br/>Format: Electronic Resources<br/>Secure Data Management Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116252024-05-24T01:25:39Z2024-05-24T01:25:39Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11844662">http://dx.doi.org/10.1007/11844662</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5100202024-05-24T01:25:39Z2024-05-24T01:25:39Zby Ioannidis, John. editor.<br/><a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format: Electronic Resources<br/>Secure Data Management Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103442024-05-24T01:25:39Z2024-05-24T01:25:39Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11552338">http://dx.doi.org/10.1007/11552338</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103492024-05-24T01:25:39Z2024-05-24T01:25:39Zby Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part Ient://SD_ILS/0/SD_ILS:5103532024-05-24T01:25:39Z2024-05-24T01:25:39Zby Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11552413">http://dx.doi.org/10.1007/11552413</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5103562024-05-24T01:25:39Z2024-05-24T01:25:39Zby Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11552451">http://dx.doi.org/10.1007/11552451</a><br/>Format: Electronic Resources<br/>Computational Intelligence and Security International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5100752024-05-24T01:25:39Z2024-05-24T01:25:39Zby Hao, Yue. editor.<br/><a href="http://dx.doi.org/10.1007/11596981">http://dx.doi.org/10.1007/11596981</a><br/>Format: Electronic Resources<br/>Computational Intelligence and Security International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings Part Ient://SD_ILS/0/SD_ILS:5100762024-05-24T01:25:39Z2024-05-24T01:25:39Zby Hao, Yue. editor.<br/><a href="http://dx.doi.org/10.1007/11596448">http://dx.doi.org/10.1007/11596448</a><br/>Format: Electronic Resources<br/>Computer Network Securityent://SD_ILS/0/SD_ILS:5043732024-05-24T01:25:39Z2024-05-24T01:25:39Zby Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format: Electronic Resources<br/>Quality of Service in Multiservice IP Networks Third International Workshop, QoS-IP 2005, Catania, Italy, February 2-4, 2004, Catania, Italy, February 2-4, 2004. Proceedingsent://SD_ILS/0/SD_ILS:5097512024-05-24T01:25:39Z2024-05-24T01:25:39Zby Ajmone Marsan, Marco. editor.<br/><a href="http://dx.doi.org/10.1007/b105169">http://dx.doi.org/10.1007/b105169</a><br/>Format: Electronic Resources<br/>Quality of Service – IWQoS 2005 13th International Workshop, IWQoS 2005, Passau, Germany, June 21-23, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101142024-05-24T01:25:39Z2024-05-24T01:25:39Zby Meer, Hermann. editor.<br/><a href="http://dx.doi.org/10.1007/b137286">http://dx.doi.org/10.1007/b137286</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104242024-05-24T01:25:39Z2024-05-24T01:25:39Zby Kantor, Paul. editor.<br/><a href="http://dx.doi.org/10.1007/b136511">http://dx.doi.org/10.1007/b136511</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5103312024-05-24T01:25:39Z2024-05-24T01:25:39Zby Martin, David. editor.<br/><a href="http://dx.doi.org/10.1007/b136164">http://dx.doi.org/10.1007/b136164</a><br/>Format: Electronic Resources<br/>Operations and Management in IP-Based Networks 5th IEEE International Workshop on IP Operations and Management, IPOM 2005, Barcelona, Spain, October 26-28, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104562024-05-24T01:25:39Z2024-05-24T01:25:39Zby Magedanz, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/11567486">http://dx.doi.org/10.1007/11567486</a><br/>Format: Electronic Resources<br/>Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5106482024-05-24T01:25:39Z2024-05-24T01:25:39Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format: Electronic Resources<br/>Service Availability Second International Service Availability Symposium, ISAS 2005, Berlin, Germany, April 25 – 26, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5103832024-05-24T01:25:39Z2024-05-24T01:25:39Zby Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/11560333">http://dx.doi.org/10.1007/11560333</a><br/>Format: Electronic Resources<br/>Trust Management Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5104032024-05-24T01:25:39Z2024-05-24T01:25:39Zby Herrmann, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/b136639">http://dx.doi.org/10.1007/b136639</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:5103602024-05-24T01:25:39Z2024-05-24T01:25:39Zby Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11553939">http://dx.doi.org/10.1007/11553939</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part IVent://SD_ILS/0/SD_ILS:5103632024-05-24T01:25:39Z2024-05-24T01:25:39Zby Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11554028">http://dx.doi.org/10.1007/11554028</a><br/>Format: Electronic Resources<br/>Business Process Management 3rd International Conference, BPM 2005, Nancy, France, September 5-8, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5103012024-05-24T01:25:39Z2024-05-24T01:25:39Zby Aalst, Wil M. P. editor.<br/><a href="http://dx.doi.org/10.1007/11538394">http://dx.doi.org/10.1007/11538394</a><br/>Format: Electronic Resources<br/>Service Availability First International Service Availability Symposium, ISAS 2004, Munich, Germany, May 13-14, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5096842024-05-24T01:25:39Z2024-05-24T01:25:39Zby Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/b105309">http://dx.doi.org/10.1007/b105309</a><br/>Format: Electronic Resources<br/>Intuitive Human Interfaces for Organizing and Accessing Intellectual Assets International Workshop, Dagstuhl Castle, Germany, March 1-5, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5105552024-05-24T01:25:39Z2024-05-24T01:25:39Zby Grieser, Gunter. editor.<br/><a href="http://dx.doi.org/10.1007/b104697">http://dx.doi.org/10.1007/b104697</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5100632024-05-24T01:25:39Z2024-05-24T01:25:39Zby Chadwick, David. editor.<br/><a href="http://dx.doi.org/10.1007/11533733">http://dx.doi.org/10.1007/11533733</a><br/>Format: Electronic Resources<br/>