Search Results for - Narrowed by: Management of Computing and Information Systems.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026ps$003d300$0026isd$003dtrue?2024-05-20T08:27:25ZResources, Co-Evolution and Artifacts Theory in CSCWent://SD_ILS/0/SD_ILS:5024352024-05-20T08:27:25Z2024-05-20T08:27:25Zby Ackerman, Mark S. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-901-9">http://dx.doi.org/10.1007/978-1-84628-901-9</a><br/>Format: Electronic Resources<br/>Enterprise Interoperability III New Challenges and Industrial Approachesent://SD_ILS/0/SD_ILS:5025252024-05-20T08:27:25Z2024-05-20T08:27:25Zby Mertins, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-221-0">http://dx.doi.org/10.1007/978-1-84800-221-0</a><br/>Format: Electronic Resources<br/>FM 2008: Formal Methods 15th International Symposium on Formal Methods, Turku, Finland, May 26-30, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026332024-05-20T08:27:25Z2024-05-20T08:27:25Zby Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68237-0">http://dx.doi.org/10.1007/978-3-540-68237-0</a><br/>Format: Electronic Resources<br/>Agile Processes in Software Engineering and Extreme Programming 9th International Conference, XP 2008, Limerick, Ireland, June 10-14, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026342024-05-20T08:27:25Z2024-05-20T08:27:25Zby Abrahamsson, Pekka. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68255-4">http://dx.doi.org/10.1007/978-3-540-68255-4</a><br/>Format: Electronic Resources<br/>Guide to Advanced Empirical Software Engineeringent://SD_ILS/0/SD_ILS:5024682024-05-20T08:27:25Z2024-05-20T08:27:25Zby Shull, Forrest. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-044-5">http://dx.doi.org/10.1007/978-1-84800-044-5</a><br/>Format: Electronic Resources<br/>Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036132024-05-20T08:27:25Z2024-05-20T08:27:25Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85259-9">http://dx.doi.org/10.1007/978-3-540-85259-9</a><br/>Format: Electronic Resources<br/>Balancing Agility and Formalism in Software Engineering Second IFIP TC 2 Central and East European Conference on Software Engineering Techniques, CEE-SET 2007, Poznan, Poland, October 10-12, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5036152024-05-20T08:27:25Z2024-05-20T08:27:25Zby Meyer, Bertrand. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85279-7">http://dx.doi.org/10.1007/978-3-540-85279-7</a><br/>Format: Electronic Resources<br/>Making Globally Distributed Software Development a Success Story International Conference on Software Process, ICSP 2008 Leipzig, Germany, May 10-11, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5035442024-05-20T08:27:25Z2024-05-20T08:27:25Zby Wang, Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79588-9">http://dx.doi.org/10.1007/978-3-540-79588-9</a><br/>Format: Electronic Resources<br/>Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037492024-05-20T08:27:25Z2024-05-20T08:27:25Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037532024-05-20T08:27:25Z2024-05-20T08:27:25Zby Buchmann, Johannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5034812024-05-20T08:27:25Z2024-05-20T08:27:25Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format: Electronic Resources<br/>Emerging Web Services Technology, Volume IIent://SD_ILS/0/SD_ILS:5039422024-05-20T08:27:25Z2024-05-20T08:27:25Zby Gschwind, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-7643-8864-5">http://dx.doi.org/10.1007/978-3-7643-8864-5</a><br/>Format: Electronic Resources<br/>Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:5037892024-05-20T08:27:25Z2024-05-20T08:27:25Zby Solanki, Kaushal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2008 The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035032024-05-20T08:27:25Z2024-05-20T08:27:25Zby Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79263-5">http://dx.doi.org/10.1007/978-3-540-79263-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038002024-05-20T08:27:25Z2024-05-20T08:27:25Zby Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format: Electronic Resources<br/>Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028122024-05-20T08:27:25Z2024-05-20T08:27:25Zby Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70567-3">http://dx.doi.org/10.1007/978-3-540-70567-3</a><br/>Format: Electronic Resources<br/>ECOOP 2008 – Object-Oriented Programming 22nd European Conference Paphos, Cyprus, July 7-11, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028202024-05-20T08:27:25Z2024-05-20T08:27:25Zby Vitek, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70592-5">http://dx.doi.org/10.1007/978-3-540-70592-5</a><br/>Format: Electronic Resources<br/>Requirements Management The Interface Between Requirements Development and All Other Systems Engineering Processesent://SD_ILS/0/SD_ILS:5026462024-05-20T08:27:25Z2024-05-20T08:27:25Zby Hood, Colin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68476-3">http://dx.doi.org/10.1007/978-3-540-68476-3</a><br/>Format: Electronic Resources<br/>Testing of Software and Communicating Systems 20th IFIP TC 6/WG 6.1 International Conference, TestCom 2008 8th International Workshop, FATES 2008 Tokyo, Japan, June 10-13, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026522024-05-20T08:27:25Z2024-05-20T08:27:25Zby Suzuki, Kenji. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68524-1">http://dx.doi.org/10.1007/978-3-540-68524-1</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027562024-05-20T08:27:25Z2024-05-20T08:27:25Zby Mjølsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69485-4">http://dx.doi.org/10.1007/978-3-540-69485-4</a><br/>Format: Electronic Resources<br/>Objects, Components, Models and Patterns 46th International Conference, TOOLS EUROPE 2008, Zurich, Switzerland, June 30 - July 4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027772024-05-20T08:27:25Z2024-05-20T08:27:25Zby Paige, Richard F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69824-1">http://dx.doi.org/10.1007/978-3-540-69824-1</a><br/>Format: Electronic Resources<br/>Reliable Software Technologies – Ada-Europe 2008 13th Ada-Europe International Conference on Reliable Software Technologies, Venice, Italy, June 16-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026622024-05-20T08:27:25Z2024-05-20T08:27:25Zby Kordon, Fabrice. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68624-8">http://dx.doi.org/10.1007/978-3-540-68624-8</a><br/>Format: Electronic Resources<br/>Model-Driven Testingent://SD_ILS/0/SD_ILS:5028922024-05-20T08:27:25Z2024-05-20T08:27:25Zby Baker, Paul. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72563-3">http://dx.doi.org/10.1007/978-3-540-72563-3</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5028032024-05-20T08:27:25Z2024-05-20T08:27:25Zby Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format: Electronic Resources<br/>Rightshore! Successfully SAP(R) Projects Offshoreent://SD_ILS/0/SD_ILS:5032262024-05-20T08:27:25Z2024-05-20T08:27:25Zby Messner, Wolfgang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77288-0">http://dx.doi.org/10.1007/978-3-540-77288-0</a><br/>Format: Electronic Resources<br/>Active Knowledge Modeling of Enterprisesent://SD_ILS/0/SD_ILS:5035192024-05-20T08:27:25Z2024-05-20T08:27:25Zby Lillehagen, Frank. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79416-5">http://dx.doi.org/10.1007/978-3-540-79416-5</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5036102024-05-20T08:27:25Z2024-05-20T08:27:25Zby Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5035332024-05-20T08:27:25Z2024-05-20T08:27:25Zby Pei, Dingyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format: Electronic Resources<br/>TestGoal Result-Driven Testingent://SD_ILS/0/SD_ILS:5034392024-05-20T08:27:25Z2024-05-20T08:27:25Zby De Grood, Derk-Jan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78829-4">http://dx.doi.org/10.1007/978-3-540-78829-4</a><br/>Format: Electronic Resources<br/>Formal Methods and Testing An Outcome of the FORTEST Network, Revised Selected Papersent://SD_ILS/0/SD_ILS:5034492024-05-20T08:27:25Z2024-05-20T08:27:25Zby Hierons, Robert M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78917-8">http://dx.doi.org/10.1007/978-3-540-78917-8</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033872024-05-20T08:27:25Z2024-05-20T08:27:25Zby Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part Ient://SD_ILS/0/SD_ILS:5036362024-05-20T08:27:25Z2024-05-20T08:27:25Zby Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85563-7">http://dx.doi.org/10.1007/978-3-540-85563-7</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5036372024-05-20T08:27:25Z2024-05-20T08:27:25Zby Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85565-1">http://dx.doi.org/10.1007/978-3-540-85565-1</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:5036382024-05-20T08:27:25Z2024-05-20T08:27:25Zby Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85567-5">http://dx.doi.org/10.1007/978-3-540-85567-5</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038212024-05-20T08:27:25Z2024-05-20T08:27:25Zby Franklin, Matthew K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format: Electronic Resources<br/>Biosurveillance and Biosecurity International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038312024-05-20T08:27:25Z2024-05-20T08:27:25Zby Zeng, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89746-0">http://dx.doi.org/10.1007/978-3-540-89746-0</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038322024-05-20T08:27:25Z2024-05-20T08:27:25Zby Chowdhury, Dipanwita Roy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89754-5">http://dx.doi.org/10.1007/978-3-540-89754-5</a><br/>Format: Electronic Resources<br/>Model Driven Architecture – Foundations and Applications 4th European Conference, ECMDA-FA 2008, Berlin, Germany, June 9-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027092024-05-20T08:27:25Z2024-05-20T08:27:25Zby Schieferdecker, Ina. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69100-6">http://dx.doi.org/10.1007/978-3-540-69100-6</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IIIent://SD_ILS/0/SD_ILS:5026992024-05-20T08:27:25Z2024-05-20T08:27:25Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037082024-05-20T08:27:25Z2024-05-20T08:27:25Zby Harrison, Michael D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038182024-05-20T08:27:25Z2024-05-20T08:27:25Zby Matsuura, Kanta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5036492024-05-20T08:27:25Z2024-05-20T08:27:25Zby Furnell, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format: Electronic Resources<br/>Business Process Management 6th International Conference, BPM 2008, Milan, Italy, September 2-4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036502024-05-20T08:27:25Z2024-05-20T08:27:25Zby Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85758-7">http://dx.doi.org/10.1007/978-3-540-85758-7</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5037932024-05-20T08:27:25Z2024-05-20T08:27:25Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format: Electronic Resources<br/>The Practice of Enterprise Modeling First IFIP WG 8.1 Working Conference, PoEM 2008, Stockholm, Sweden, November 12-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037962024-05-20T08:27:25Z2024-05-20T08:27:25Zby Stirna, Janis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89218-2">http://dx.doi.org/10.1007/978-3-540-89218-2</a><br/>Format: Electronic Resources<br/>Web Services and Formal Methods 4th International Workshop, WS-FM 2007, Brisbane, Australia, September 28-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5034962024-05-20T08:27:25Z2024-05-20T08:27:25Zby Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79230-7">http://dx.doi.org/10.1007/978-3-540-79230-7</a><br/>Format: Electronic Resources<br/>Advances in Ad Hoc Networking Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25–27, 2008ent://SD_ILS/0/SD_ILS:5015232024-05-20T08:27:25Z2024-05-20T08:27:25Zby Cuenca, Pedro. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09490-8">http://dx.doi.org/10.1007/978-0-387-09490-8</a><br/>Format: Electronic Resources<br/>High Confidence Software Reuse in Large Systems 10th International Conference on Software Reuse, ICSR 2008, Beijing, China, May 25-29, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026132024-05-20T08:27:25Z2024-05-20T08:27:25Zby Mei, Hong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68073-4">http://dx.doi.org/10.1007/978-3-540-68073-4</a><br/>Format: Electronic Resources<br/>Pervasive Collaborative Networks IFIP TC 5 WG 5.5 Ninth Working Conference on VIRTUAL ENTERPRISES, September 8-10, 2008, Poznan, Polandent://SD_ILS/0/SD_ILS:5019982024-05-20T08:27:25Z2024-05-20T08:27:25Zby Camarinha-Matos, Luis M. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-84837-2">http://dx.doi.org/10.1007/978-0-387-84837-2</a><br/>Format: Electronic Resources<br/>Service Availability 5th International Service Availability Symposium, ISAS 2008 Tokyo, Japan, May 19-21, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026202024-05-20T08:27:25Z2024-05-20T08:27:25Zby Nanya, Takashi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68129-8">http://dx.doi.org/10.1007/978-3-540-68129-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2008 First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026232024-05-20T08:27:25Z2024-05-20T08:27:25Zby Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68164-9">http://dx.doi.org/10.1007/978-3-540-68164-9</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028272024-05-20T08:27:25Z2024-05-20T08:27:25Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection IIent://SD_ILS/0/SD_ILS:5020092024-05-20T08:27:25Z2024-05-20T08:27:25Zby Papa, Mauricio. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-88523-0">http://dx.doi.org/10.1007/978-0-387-88523-0</a><br/>Format: Electronic Resources<br/>Advanced Methods for Inconsistent Knowledge Managementent://SD_ILS/0/SD_ILS:5024342024-05-20T08:27:25Z2024-05-20T08:27:25Zby Nguyen, Ngoc Thanh. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-889-0">http://dx.doi.org/10.1007/978-1-84628-889-0</a><br/>Format: Electronic Resources<br/>Resilient Networks and Services Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028182024-05-20T08:27:25Z2024-05-20T08:27:25Zby Hausheer, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70587-1">http://dx.doi.org/10.1007/978-3-540-70587-1</a><br/>Format: Electronic Resources<br/>The IT Measurement Compendium Estimating and Benchmarking Success with Functional Size Measurementent://SD_ILS/0/SD_ILS:5026272024-05-20T08:27:25Z2024-05-20T08:27:25Zby Bundschuh, Manfred. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68188-5">http://dx.doi.org/10.1007/978-3-540-68188-5</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027302024-05-20T08:27:25Z2024-05-20T08:27:25Zby Rong, Chunming. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69295-9">http://dx.doi.org/10.1007/978-3-540-69295-9</a><br/>Format: Electronic Resources<br/>Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027502024-05-20T08:27:25Z2024-05-20T08:27:25Zby Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format: Electronic Resources<br/>Product-Focused Software Process Improvement 9th International Conference, PROFES 2008 Monte Porzio Catone, Italy, June 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027642024-05-20T08:27:25Z2024-05-20T08:27:25Zby Jedlitschka, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69566-0">http://dx.doi.org/10.1007/978-3-540-69566-0</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026912024-05-20T08:27:25Z2024-05-20T08:27:25Zby Bellovin, Steven M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks in Pattern Recognition Third IAPR Workshop, ANNPR 2008 Paris, France, July 2-4, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027912024-05-20T08:27:25Z2024-05-20T08:27:25Zby Prevost, Lionel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69939-2">http://dx.doi.org/10.1007/978-3-540-69939-2</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027932024-05-20T08:27:25Z2024-05-20T08:27:25Zby Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format: Electronic Resources<br/>Open Source Development, Communities and Quality IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:5015432024-05-20T08:27:25Z2024-05-20T08:27:25Zby Russo, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09684-1">http://dx.doi.org/10.1007/978-0-387-09684-1</a><br/>Format: Electronic Resources<br/>Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:5015462024-05-20T08:27:25Z2024-05-20T08:27:25Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Electronic Resources<br/>Requirements Engineering: Foundation for Software Quality 14th International Working Conference, REFSQ 2008 Montpellier, France, June 16-17, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027042024-05-20T08:27:25Z2024-05-20T08:27:25Zby Paech, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69062-7">http://dx.doi.org/10.1007/978-3-540-69062-7</a><br/>Format: Electronic Resources<br/>Models in Software Engineering Workshops and Symposia at MoDELS 2007, Nashville, TN, USA, September 30 - October 5, 2007, Reports and Revised Selected Papersent://SD_ILS/0/SD_ILS:5027062024-05-20T08:27:25Z2024-05-20T08:27:25Zby Giese, Holger. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69073-3">http://dx.doi.org/10.1007/978-3-540-69073-3</a><br/>Format: Electronic Resources<br/>Object-Oriented Technology. ECOOP 2007 Workshop Reader ECOOP 2007 Workshops, Berlin, Germany, July 30-31, 2007, Final Reportsent://SD_ILS/0/SD_ILS:5033352024-05-20T08:27:25Z2024-05-20T08:27:25Zby Cebulla, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78195-0">http://dx.doi.org/10.1007/978-3-540-78195-0</a><br/>Format: Electronic Resources<br/>Business Process Management Workshops BPM 2007 International Workshops, BPI, BPD, CBP, ProHealth, RefMod, semantics4ws, Brisbane, Australia, September 24, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5033392024-05-20T08:27:25Z2024-05-20T08:27:25Zby Hofstede, Arthur. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78238-4">http://dx.doi.org/10.1007/978-3-540-78238-4</a><br/>Format: Electronic Resources<br/>Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038392024-05-20T08:27:25Z2024-05-20T08:27:25Zby Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036002024-05-20T08:27:25Z2024-05-20T08:27:25Zby Wagner, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format: Electronic Resources<br/>Data Management in Grid and Peer-to-Peer Systems First International Conference, Globe 2008, Turin, Italy, September 3, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036012024-05-20T08:27:25Z2024-05-20T08:27:25Zby Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85176-9">http://dx.doi.org/10.1007/978-3-540-85176-9</a><br/>Format: Electronic Resources<br/>Managing Large-Scale Service Deployment 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036782024-05-20T08:27:25Z2024-05-20T08:27:25Zby Turck, Filip. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87353-2">http://dx.doi.org/10.1007/978-3-540-87353-2</a><br/>Format: Electronic Resources<br/>Modelling Autonomic Communications Environments Third IEEE International Workshop, MACE 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036792024-05-20T08:27:25Z2024-05-20T08:27:25Zby Meer, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87355-6">http://dx.doi.org/10.1007/978-3-540-87355-6</a><br/>Format: Electronic Resources<br/>IP Operations and Management 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036802024-05-20T08:27:25Z2024-05-20T08:27:25Zby Akar, Nail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87357-0">http://dx.doi.org/10.1007/978-3-540-87357-0</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036842024-05-20T08:27:25Z2024-05-20T08:27:25Zby Lippmann, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format: Electronic Resources<br/>Modelling, Computation and Optimization in Information Systems and Management Sciences Second International Conference MCO 2008, Metz, France - Luxembourg, September 8-10, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036922024-05-20T08:27:25Z2024-05-20T08:27:25Zby Le Thi, Hoai An. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87477-5">http://dx.doi.org/10.1007/978-3-540-87477-5</a><br/>Format: Electronic Resources<br/>Software Evolutionent://SD_ILS/0/SD_ILS:5031722024-05-20T08:27:25Z2024-05-20T08:27:25Zby Mens, Tom. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76440-3">http://dx.doi.org/10.1007/978-3-540-76440-3</a><br/>Format: Electronic Resources<br/>Public Key Cryptography – PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033722024-05-20T08:27:25Z2024-05-20T08:27:25Zby Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format: Electronic Resources<br/>Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5033752024-05-20T08:27:25Z2024-05-20T08:27:25Zby Bonchi, Francesco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78478-4">http://dx.doi.org/10.1007/978-3-540-78478-4</a><br/>Format: Electronic Resources<br/>Emerging Technologies and Information Systems for the Knowledge Society First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037172024-05-20T08:27:25Z2024-05-20T08:27:25Zby Lytras, Miltiadis D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87781-3">http://dx.doi.org/10.1007/978-3-540-87781-3</a><br/>Format: Electronic Resources<br/>The Open Knowlege Society. A Computer Science and Information Systems Manifesto First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037182024-05-20T08:27:25Z2024-05-20T08:27:25Zby Lytras, Miltiadis D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87783-7">http://dx.doi.org/10.1007/978-3-540-87783-7</a><br/>Format: Electronic Resources<br/>Software Technologies for Embedded and Ubiquitous Systems 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037192024-05-20T08:27:25Z2024-05-20T08:27:25Zby Brinkschulte, Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87785-1">http://dx.doi.org/10.1007/978-3-540-87785-1</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036602024-05-20T08:27:25Z2024-05-20T08:27:25Zby Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data and Processes Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake City, UT, USA, June 17-18, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5038462024-05-20T08:27:25Z2024-05-20T08:27:25Zby Freire, Juliana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89965-5">http://dx.doi.org/10.1007/978-3-540-89965-5</a><br/>Format: Electronic Resources<br/>Itil® Version 3 at a Glance Information Quick Referenceent://SD_ILS/0/SD_ILS:5019182024-05-20T08:27:25Z2024-05-20T08:27:25Zby Long, John O. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77393-3">http://dx.doi.org/10.1007/978-0-387-77393-3</a><br/>Format: Electronic Resources<br/>Policies and Research in Identity Management First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007ent://SD_ILS/0/SD_ILS:5019392024-05-20T08:27:25Z2024-05-20T08:27:25Zby Leeuw, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77996-6">http://dx.doi.org/10.1007/978-0-387-77996-6</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035632024-05-20T08:27:25Z2024-05-20T08:27:25Zby Onieva, Jose A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format: Electronic Resources<br/>Software Process and Product Measurement International Conferences IWSM 2008, Metrikon 2008, and Mensura 2008 Munich, Germany, November 18-19, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038092024-05-20T08:27:25Z2024-05-20T08:27:25Zby Dumke, Reiner R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89403-2">http://dx.doi.org/10.1007/978-3-540-89403-2</a><br/>Format: Electronic Resources<br/>Software Process and Product Measurement International Conference, IWSM-Mensura 2007, Palma de Mallorca, Spain, November 5-8, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5036342024-05-20T08:27:25Z2024-05-20T08:27:25Zby Cuadrado-Gallego, Juan J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85553-8">http://dx.doi.org/10.1007/978-3-540-85553-8</a><br/>Format: Electronic Resources<br/>Model Driven Engineering Languages and Systems 11th International Conference, MoDELS 2008, Toulouse, France, September 28 - October 3, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037242024-05-20T08:27:25Z2024-05-20T08:27:25Zby Czarnecki, Krzysztof. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87875-9">http://dx.doi.org/10.1007/978-3-540-87875-9</a><br/>Format: Electronic Resources<br/>Rationale-Based Software Engineeringent://SD_ILS/0/SD_ILS:5032702024-05-20T08:27:25Z2024-05-20T08:27:25Zby Burge, Janet E. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77583-6">http://dx.doi.org/10.1007/978-3-540-77583-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2008 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5034552024-05-20T08:27:25Z2024-05-20T08:27:25Zby Smart, Nigel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78967-3">http://dx.doi.org/10.1007/978-3-540-78967-3</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036642024-05-20T08:27:25Z2024-05-20T08:27:25Zby Grimaud, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format: Electronic Resources<br/>Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035862024-05-20T08:27:25Z2024-05-20T08:27:25Zby Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038432024-05-20T08:27:25Z2024-05-20T08:27:25Zby Ortiz-Arroyo, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89900-6">http://dx.doi.org/10.1007/978-3-540-89900-6</a><br/>Format: Electronic Resources<br/>Electronic Government 7th International Conference, EGOV 2008, Turin, Italy, August 31 - September 5, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036052024-05-20T08:27:25Z2024-05-20T08:27:25Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85204-9">http://dx.doi.org/10.1007/978-3-540-85204-9</a><br/>Format: Electronic Resources<br/>Principles of Distributed Systems 12th International Conference, OPODIS 2008, Luxor, Egypt, December 15-18, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038572024-05-20T08:27:25Z2024-05-20T08:27:25Zby Baker, Theodore P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92221-6">http://dx.doi.org/10.1007/978-3-540-92221-6</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038052024-05-20T08:27:25Z2024-05-20T08:27:25Zby Kulkarni, Sandeep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89335-6">http://dx.doi.org/10.1007/978-3-540-89335-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5122482024-05-20T08:27:25Z2024-05-20T08:27:25Zby Vadhan, Salil P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papersent://SD_ILS/0/SD_ILS:5129222024-05-20T08:27:25Z2024-05-20T08:27:25Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127612024-05-20T08:27:25Z2024-05-20T08:27:25Zby Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 9th International Symposium, SSS 2007 Paris, France, November 14-16, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129612024-05-20T08:27:25Z2024-05-20T08:27:25Zby Masuzawa, Toshimitsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76627-8">http://dx.doi.org/10.1007/978-3-540-76627-8</a><br/>Format: Electronic Resources<br/>Computational Intelligence and Security International Conference, CIS 2006. Guangzhou, China, November 3-6, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:5127822024-05-20T08:27:25Z2024-05-20T08:27:25Zby Wang, Yuping. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74377-4">http://dx.doi.org/10.1007/978-3-540-74377-4</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127842024-05-20T08:27:25Z2024-05-20T08:27:25Zby Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129742024-05-20T08:27:25Z2024-05-20T08:27:25Zby Nam, Kil-Hyun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128712024-05-20T08:27:25Z2024-05-20T08:27:25Zby Saglietti, Francesca. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129862024-05-20T08:27:25Z2024-05-20T08:27:25Zby Kurosawa, Kaoru. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format: Electronic Resources<br/>Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130042024-05-20T08:27:25Z2024-05-20T08:27:25Zby Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125292024-05-20T08:27:25Z2024-05-20T08:27:25Zby Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5123622024-05-20T08:27:25Z2024-05-20T08:27:25Zby Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71549-8">http://dx.doi.org/10.1007/978-3-540-71549-8</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124602024-05-20T08:27:25Z2024-05-20T08:27:25Zby Sauveron, Damien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format: Electronic Resources<br/>Model Driven Architecture- Foundations and Applications Third European Conference, ECMDA-FA 2007, Haifa, Israel, June 11-15, 2007, Proccedingsent://SD_ILS/0/SD_ILS:5125532024-05-20T08:27:25Z2024-05-20T08:27:25Zby Akehurst, David H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72901-3">http://dx.doi.org/10.1007/978-3-540-72901-3</a><br/>Format: Electronic Resources<br/>Requirements Engineering: Foundation for Software Quality 13th International Working Conference, REFSQ 2007, Trondheim, Norway, June 11-12, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125812024-05-20T08:27:25Z2024-05-20T08:27:25Zby Sawyer, Pete. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73031-6">http://dx.doi.org/10.1007/978-3-540-73031-6</a><br/>Format: Electronic Resources<br/>Rapid Integration of Software Engineering Techniques Third International Workshop, RISE 2006, Geneva, Switzerland, September 13-15, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:5124022024-05-20T08:27:25Z2024-05-20T08:27:25Zby Guelfi, Nicolas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71876-5">http://dx.doi.org/10.1007/978-3-540-71876-5</a><br/>Format: Electronic Resources<br/>Testing of Software and Communicating Systems 19th IFIP TC6/WG6.1 International Conference, TestCom 2007, 7th International Workshop, FATES 2007, Tallinn, Estonia, June 26-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125892024-05-20T08:27:25Z2024-05-20T08:27:25Zby Petrenko, Alexandre. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73066-8">http://dx.doi.org/10.1007/978-3-540-73066-8</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IIent://SD_ILS/0/SD_ILS:5125942024-05-20T08:27:25Z2024-05-20T08:27:25Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73092-7">http://dx.doi.org/10.1007/978-3-540-73092-7</a><br/>Format: Electronic Resources<br/>Agile Processes in Software Engineering and Extreme Programming 8th International Conference, XP 2007, Como, Italy, June 18-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125972024-05-20T08:27:25Z2024-05-20T08:27:25Zby Concas, Giulio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73101-6">http://dx.doi.org/10.1007/978-3-540-73101-6</a><br/>Format: Electronic Resources<br/>SDL 2007: Design for Dependable Systems 13th International SDL Forum Paris, France, September 18-21, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5128662024-05-20T08:27:25Z2024-05-20T08:27:25Zby Gaudin, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74984-4">http://dx.doi.org/10.1007/978-3-540-74984-4</a><br/>Format: Electronic Resources<br/>Advances in Biometrics International Conference, ICB 2007, Seoul, Korea, August 27-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128032024-05-20T08:27:25Z2024-05-20T08:27:25Zby Lee, Seong-Whan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74549-5">http://dx.doi.org/10.1007/978-3-540-74549-5</a><br/>Format: Electronic Resources<br/>Business Process Management 5th International Conference, BPM 2007, Brisbane, Australia, September 24-28, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128802024-05-20T08:27:25Z2024-05-20T08:27:25Zby Alonso, Gustavo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75183-0">http://dx.doi.org/10.1007/978-3-540-75183-0</a><br/>Format: Electronic Resources<br/>Preserving Digital Informationent://SD_ILS/0/SD_ILS:5115792024-05-20T08:27:25Z2024-05-20T08:27:25Zby Gladney, Henry M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-37887-7">http://dx.doi.org/10.1007/978-3-540-37887-7</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124402024-05-20T08:27:25Z2024-05-20T08:27:25Zby Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format: Electronic Resources<br/>Service Availability 4th International Service Availability Symposium, ISAS 2007, Durham, NH, USA, May 21-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125282024-05-20T08:27:25Z2024-05-20T08:27:25Zby Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72736-1">http://dx.doi.org/10.1007/978-3-540-72736-1</a><br/>Format: Electronic Resources<br/>Software Process Dynamics and Agility International Conference on Software Process, ICSP 2007, Minneapolis, MN, USA, May 19-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124732024-05-20T08:27:25Z2024-05-20T08:27:25Zby Wang, Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72426-1">http://dx.doi.org/10.1007/978-3-540-72426-1</a><br/>Format: Electronic Resources<br/>Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5122762024-05-20T08:27:25Z2024-05-20T08:27:25Zby Lee, Jae Kwang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format: Electronic Resources<br/>Anti-Spam Measures Analysis and Designent://SD_ILS/0/SD_ILS:5123902024-05-20T08:27:25Z2024-05-20T08:27:25Zby Schryen, Guido. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71750-8">http://dx.doi.org/10.1007/978-3-540-71750-8</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126752024-05-20T08:27:25Z2024-05-20T08:27:25Zby Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format: Electronic Resources<br/>Product-Focused Software Process Improvement 8th International Conference, PROFES 2007, Riga, Latvia, July 2-4, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126762024-05-20T08:27:25Z2024-05-20T08:27:25Zby Münch, Jürgen. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73460-4">http://dx.doi.org/10.1007/978-3-540-73460-4</a><br/>Format: Electronic Resources<br/>Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130172024-05-20T08:27:25Z2024-05-20T08:27:25Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77156-2">http://dx.doi.org/10.1007/978-3-540-77156-2</a><br/>Format: Electronic Resources<br/>Software Engineering Approaches for Offshore and Outsourced Development First International Conference, SEAFOOD 2007, Zurich, Switzerland, February 5-6, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5129202024-05-20T08:27:25Z2024-05-20T08:27:25Zby Meyer, Bertrand. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75542-5">http://dx.doi.org/10.1007/978-3-540-75542-5</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128462024-05-20T08:27:25Z2024-05-20T08:27:25Zby Biskup, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130322024-05-20T08:27:25Z2024-05-20T08:27:25Zby Adams, Carlisle. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format: Electronic Resources<br/>Runtime Verification 7th International Workshop, RV 2007, Vancover, Canada, March 13, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130362024-05-20T08:27:25Z2024-05-20T08:27:25Zby Sokolsky, Oleg. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77395-5">http://dx.doi.org/10.1007/978-3-540-77395-5</a><br/>Format: Electronic Resources<br/>E-Voting and Identity First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130402024-05-20T08:27:25Z2024-05-20T08:27:25Zby Alkassar, Ammar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77493-8">http://dx.doi.org/10.1007/978-3-540-77493-8</a><br/>Format: Electronic Resources<br/>Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130422024-05-20T08:27:25Z2024-05-20T08:27:25Zby Okada, Mitsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77505-8">http://dx.doi.org/10.1007/978-3-540-77505-8</a><br/>Format: Electronic Resources<br/>Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130432024-05-20T08:27:25Z2024-05-20T08:27:25Zby Kim, Sehun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77535-5">http://dx.doi.org/10.1007/978-3-540-77535-5</a><br/>Format: Electronic Resources<br/>Sustainable Internet Third Asian Internet Engineering Conference, AINTEC 2007, Phuket, Thailand, November 27-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129762024-05-20T08:27:25Z2024-05-20T08:27:25Zby Fdida, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76809-8">http://dx.doi.org/10.1007/978-3-540-76809-8</a><br/>Format: Electronic Resources<br/>Early Aspects: Current Challenges and Future Directions 10th International Workshop, Vancouver, Canada, March 13, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5129772024-05-20T08:27:25Z2024-05-20T08:27:25Zby Moreira, Ana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76811-1">http://dx.doi.org/10.1007/978-3-540-76811-1</a><br/>Format: Electronic Resources<br/>Transactions on Aspect-Oriented Software Development IIIent://SD_ILS/0/SD_ILS:5128782024-05-20T08:27:25Z2024-05-20T08:27:25Zby Rashid, Awais. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75162-5">http://dx.doi.org/10.1007/978-3-540-75162-5</a><br/>Format: Electronic Resources<br/>Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129892024-05-20T08:27:25Z2024-05-20T08:27:25Zby Cervesato, Iliano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129912024-05-20T08:27:25Z2024-05-20T08:27:25Zby Bao, Feng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76969-9">http://dx.doi.org/10.1007/978-3-540-76969-9</a><br/>Format: Electronic Resources<br/>Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129982024-05-20T08:27:25Z2024-05-20T08:27:25Zby Zhang, Hongke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2007 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129992024-05-20T08:27:25Z2024-05-20T08:27:25Zby Srinathan, K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77026-8">http://dx.doi.org/10.1007/978-3-540-77026-8</a><br/>Format: Electronic Resources<br/>Transactions on Aspect-Oriented Software Development IVent://SD_ILS/0/SD_ILS:5130022024-05-20T08:27:25Z2024-05-20T08:27:25Zby Rashid, Awais. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77042-8">http://dx.doi.org/10.1007/978-3-540-77042-8</a><br/>Format: Electronic Resources<br/>Model Driven Engineering Languages and Systems 10th International Conference, MoDELS 2007, Nashville, USA, September 30 - October 5, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128842024-05-20T08:27:25Z2024-05-20T08:27:25Zby Engels, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75209-7">http://dx.doi.org/10.1007/978-3-540-75209-7</a><br/>Format: Electronic Resources<br/>Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130072024-05-20T08:27:25Z2024-05-20T08:27:25Zby McDaniel, Patrick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format: Electronic Resources<br/>Electronic Government 6th International Conference, EGOV 2007, Regensburg, Germany, September 3-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127882024-05-20T08:27:25Z2024-05-20T08:27:25Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74444-3">http://dx.doi.org/10.1007/978-3-540-74444-3</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:5127932024-05-20T08:27:25Z2024-05-20T08:27:25Zby Biham, Eli. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format: Electronic Resources<br/>Models in Software Engineering Workshops and Symposia at MoDELS 2006, Genoa, Italy, October 1-6, 2006, Reports and Revised Selected Papersent://SD_ILS/0/SD_ILS:5121642024-05-20T08:27:25Z2024-05-20T08:27:25Zby Kühne, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69489-2">http://dx.doi.org/10.1007/978-3-540-69489-2</a><br/>Format: Electronic Resources<br/>Software Product Lines in Action The Best Industrial Practice in Product Line Engineeringent://SD_ILS/0/SD_ILS:5123412024-05-20T08:27:25Z2024-05-20T08:27:25Zby Linden, Frank. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71437-8">http://dx.doi.org/10.1007/978-3-540-71437-8</a><br/>Format: Electronic Resources<br/>Active Networks IFIP TC6 6th International Working Conference, IWAN 2004, Lawrence, KS, USA, October 27-29, 2004. Revised Papersent://SD_ILS/0/SD_ILS:5123522024-05-20T08:27:25Z2024-05-20T08:27:25Zby Minden, Gary J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71500-9">http://dx.doi.org/10.1007/978-3-540-71500-9</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics: Biosurveillance Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May 22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125042024-05-20T08:27:25Z2024-05-20T08:27:25Zby Zeng, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72608-1">http://dx.doi.org/10.1007/978-3-540-72608-1</a><br/>Format: Electronic Resources<br/>Reliable Software Technologies – Ada Europe 2007 12th Ada-Europe International Conference on Reliable Software Technologies, Geneva, Switzerland, June 25-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126212024-05-20T08:27:25Z2024-05-20T08:27:25Zby Abdennadher, Nabil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73230-3">http://dx.doi.org/10.1007/978-3-540-73230-3</a><br/>Format: Electronic Resources<br/>Software Measurement Establish — Extract — Evaluate — Executeent://SD_ILS/0/SD_ILS:5123782024-05-20T08:27:25Z2024-05-20T08:27:25Zby Ebert, Christof. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71649-5">http://dx.doi.org/10.1007/978-3-540-71649-5</a><br/>Format: Electronic Resources<br/>Public Key Cryptography – PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5123812024-05-20T08:27:25Z2024-05-20T08:27:25Zby Okamoto, Tatsuaki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format: Electronic Resources<br/>Online Communities and Social Computing Second International Conference, OCSC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126232024-05-20T08:27:25Z2024-05-20T08:27:25Zby Schuler, Douglas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73257-0">http://dx.doi.org/10.1007/978-3-540-73257-0</a><br/>Format: Electronic Resources<br/>Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126262024-05-20T08:27:25Z2024-05-20T08:27:25Zby Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Format: Electronic Resources<br/>Inter-Domain Management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125722024-05-20T08:27:25Z2024-05-20T08:27:25Zby Bandara, Arosha K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72986-0">http://dx.doi.org/10.1007/978-3-540-72986-0</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design IV FOSAD 2006/2007 Tutorial Lecturesent://SD_ILS/0/SD_ILS:5128372024-05-20T08:27:25Z2024-05-20T08:27:25Zby Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74810-6">http://dx.doi.org/10.1007/978-3-540-74810-6</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part Ient://SD_ILS/0/SD_ILS:5128402024-05-20T08:27:25Z2024-05-20T08:27:25Zby Apolloni, Bruno. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74819-9">http://dx.doi.org/10.1007/978-3-540-74819-9</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part IIent://SD_ILS/0/SD_ILS:5128432024-05-20T08:27:25Z2024-05-20T08:27:25Zby Apolloni, Bruno. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74827-4">http://dx.doi.org/10.1007/978-3-540-74827-4</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:5128442024-05-20T08:27:25Z2024-05-20T08:27:25Zby Apolloni, Bruno. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74829-8">http://dx.doi.org/10.1007/978-3-540-74829-8</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5128882024-05-20T08:27:25Z2024-05-20T08:27:25Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">http://dx.doi.org/10.1007/978-3-540-75227-1</a><br/>Format: Electronic Resources<br/>Secure Data Management 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128892024-05-20T08:27:25Z2024-05-20T08:27:25Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75248-6">http://dx.doi.org/10.1007/978-3-540-75248-6</a><br/>Format: Electronic Resources<br/>Spatial Database Systems Design, Implementation and Project Managementent://SD_ILS/0/SD_ILS:5072592024-05-20T08:27:25Z2024-05-20T08:27:25Zby Yeung, Albert K. W. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-5392-4">http://dx.doi.org/10.1007/1-4020-5392-4</a><br/>Format: Electronic Resources<br/>Enterprise Interoperability New Challenges and Approachesent://SD_ILS/0/SD_ILS:5086492024-05-20T08:27:25Z2024-05-20T08:27:25Zby Doumeingts, Guy. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-714-5">http://dx.doi.org/10.1007/978-1-84628-714-5</a><br/>Format: Electronic Resources<br/>Network-Centric Service-Oriented Enterpriseent://SD_ILS/0/SD_ILS:5076512024-05-20T08:27:25Z2024-05-20T08:27:25Zby Chang, William Y. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4020-6456-2">http://dx.doi.org/10.1007/978-1-4020-6456-2</a><br/>Format: Electronic Resources<br/>Organizational Dynamics of Technology-Based Innovation: Diversifying the Research Agenda IFIP TC 8 WG 8.6 International Working Conference, June 14–16, Manchester, UKent://SD_ILS/0/SD_ILS:5060052024-05-20T08:27:25Z2024-05-20T08:27:25Zby McMaster, Tom. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72804-9">http://dx.doi.org/10.1007/978-0-387-72804-9</a><br/>Format: Electronic Resources<br/>Software Process Improvement 14th European Conference, EuroSPI 2007, Potsdam, Germany, September 26-28, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129022024-05-20T08:27:25Z2024-05-20T08:27:25Zby Abrahamsson, Pekka. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75381-0">http://dx.doi.org/10.1007/978-3-540-75381-0</a><br/>Format: Electronic Resources<br/>Enterprise Interoperability II New Challenges and Approachesent://SD_ILS/0/SD_ILS:5087022024-05-20T08:27:25Z2024-05-20T08:27:25Zby Gonçalves, Ricardo J. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-858-6">http://dx.doi.org/10.1007/978-1-84628-858-6</a><br/>Format: Electronic Resources<br/>Grid Computing Securityent://SD_ILS/0/SD_ILS:5116722024-05-20T08:27:25Z2024-05-20T08:27:25Zby Chakrabarti, Anirban. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format: Electronic Resources<br/>Information Systems Action Research An Applied View of Emerging Concepts and Methodsent://SD_ILS/0/SD_ILS:5054032024-05-20T08:27:25Z2024-05-20T08:27:25Zby Kock, Ned. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36060-7">http://dx.doi.org/10.1007/978-0-387-36060-7</a><br/>Format: Electronic Resources<br/>Digital Decision Making Back to the Futureent://SD_ILS/0/SD_ILS:5086322024-05-20T08:27:25Z2024-05-20T08:27:25Zby Corrigan, Ray. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-673-5">http://dx.doi.org/10.1007/978-1-84628-673-5</a><br/>Format: Electronic Resources<br/>Metagraphs and Their Applicationsent://SD_ILS/0/SD_ILS:5054722024-05-20T08:27:25Z2024-05-20T08:27:25Zby Basu, Amit. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-37234-1">http://dx.doi.org/10.1007/978-0-387-37234-1</a><br/>Format: Electronic Resources<br/>EC2ND 2006 Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Faculty of Advanced Technology, University of Glamorgan, Wales, UKent://SD_ILS/0/SD_ILS:5086642024-05-20T08:27:25Z2024-05-20T08:27:25Zby Blyth, Andrew. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-750-3">http://dx.doi.org/10.1007/978-1-84628-750-3</a><br/>Format: Electronic Resources<br/>Guerrilla Capacity Planning A Tactical Approach to Planning for Highly Scalable Applications and Servicesent://SD_ILS/0/SD_ILS:5098402024-05-20T08:27:25Z2024-05-20T08:27:25Zby Gunther, Neil J. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-31010-5">http://dx.doi.org/10.1007/978-3-540-31010-5</a><br/>Format: Electronic Resources<br/>Business Information Systems 10th International Conference, BIS 2007, Poznan, Poland, April 25-27, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124292024-05-20T08:27:25Z2024-05-20T08:27:25Zby Abramowicz, Witold. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72035-5">http://dx.doi.org/10.1007/978-3-540-72035-5</a><br/>Format: Electronic Resources<br/>Successfully Implementing Microsoft Dynamics™ by Using the Regatta® Approach for Microsoft Dynamics™ent://SD_ILS/0/SD_ILS:5123702024-05-20T08:27:25Z2024-05-20T08:27:25Zby Koop, Reinder. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71593-1">http://dx.doi.org/10.1007/978-3-540-71593-1</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126602024-05-20T08:27:25Z2024-05-20T08:27:25Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73408-6">http://dx.doi.org/10.1007/978-3-540-73408-6</a><br/>Format: Electronic Resources<br/>Object-Oriented Technology. ECOOP 2006 Workshop Reader ECOOP 2006 Workshops, Nantes, France, July 3-7, 2006, Final Reportsent://SD_ILS/0/SD_ILS:5123912024-05-20T08:27:25Z2024-05-20T08:27:25Zby Südholt, Mario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71774-4">http://dx.doi.org/10.1007/978-3-540-71774-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124922024-05-20T08:27:25Z2024-05-20T08:27:25Zby Naor, Moni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72540-4">http://dx.doi.org/10.1007/978-3-540-72540-4</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems - CHES 2007 9th International Workshop, Vienna, Austria, September 10-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128252024-05-20T08:27:25Z2024-05-20T08:27:25Zby Paillier, Pascal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74735-2">http://dx.doi.org/10.1007/978-3-540-74735-2</a><br/>Format: Electronic Resources<br/>Data and Applications Security XXI 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126872024-05-20T08:27:25Z2024-05-20T08:27:25Zby Barker, Steve. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73538-0">http://dx.doi.org/10.1007/978-3-540-73538-0</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126902024-05-20T08:27:25Z2024-05-20T08:27:25Zby Xiao, Bin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73547-2">http://dx.doi.org/10.1007/978-3-540-73547-2</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129272024-05-20T08:27:25Z2024-05-20T08:27:25Zby Miyaji, Atsuko. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format: Electronic Resources<br/>Software Technologies for Embedded and Ubiquitous Systems 5th IFIP WG 10.2 International Workshop, SEUS 2007, Santorini Island, Greece, May 2007. Revised Papersent://SD_ILS/0/SD_ILS:5129282024-05-20T08:27:25Z2024-05-20T08:27:25Zby Obermaisser, Roman. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75664-4">http://dx.doi.org/10.1007/978-3-540-75664-4</a><br/>Format: Electronic Resources<br/>Business Intelligence for the Real-Time Enterprises First International Workshop, BIRTE 2006, Seoul, Korea, September 11, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5127392024-05-20T08:27:25Z2024-05-20T08:27:25Zby Bussler, Christoph. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73950-0">http://dx.doi.org/10.1007/978-3-540-73950-0</a><br/>Format: Electronic Resources<br/>ECOOP 2007 – Object-Oriented Programming 21st European Conference, Berlin, Germany, July 30 - August 3, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126992024-05-20T08:27:25Z2024-05-20T08:27:25Zby Ernst, Erik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73589-2">http://dx.doi.org/10.1007/978-3-540-73589-2</a><br/>Format: Electronic Resources<br/>Managing Virtualization of Networks and Services 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San José, CA, USA, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129332024-05-20T08:27:25Z2024-05-20T08:27:25Zby Clemm, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75694-1">http://dx.doi.org/10.1007/978-3-540-75694-1</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5127032024-05-20T08:27:25Z2024-05-20T08:27:25Zby Hämmerli, Bernhard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Format: Electronic Resources<br/>IP Operations and Management 7th IEEE International Workshop, IPOM 2007 San José, USA, October 31 - November 2, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129422024-05-20T08:27:25Z2024-05-20T08:27:25Zby Medhi, Deep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75853-2">http://dx.doi.org/10.1007/978-3-540-75853-2</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papersent://SD_ILS/0/SD_ILS:5130332024-05-20T08:27:25Z2024-05-20T08:27:25Zby Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format: Electronic Resources<br/>Advances in Hybrid Information Technology First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130342024-05-20T08:27:25Z2024-05-20T08:27:25Zby Szczuka, Marcin S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77368-9">http://dx.doi.org/10.1007/978-3-540-77368-9</a><br/>Format: Electronic Resources<br/>Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130352024-05-20T08:27:25Z2024-05-20T08:27:25Zby Furon, Teddy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77370-2">http://dx.doi.org/10.1007/978-3-540-77370-2</a><br/>Format: Electronic Resources<br/>Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papersent://SD_ILS/0/SD_ILS:5127562024-05-20T08:27:25Z2024-05-20T08:27:25Zby Camenisch, Jan L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127772024-05-20T08:27:25Z2024-05-20T08:27:25Zby Kruegel, Christopher. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74320-0">http://dx.doi.org/10.1007/978-3-540-74320-0</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111372024-05-20T08:27:25Z2024-05-20T08:27:25Zby Mehrotra, Sharad. editor.<br/><a href="http://dx.doi.org/10.1007/11760146">http://dx.doi.org/10.1007/11760146</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115862024-05-20T08:27:25Z2024-05-20T08:27:25Zby Prisco, Roberto. editor.<br/><a href="http://dx.doi.org/10.1007/11832072">http://dx.doi.org/10.1007/11832072</a><br/>Format: Electronic Resources<br/>Transactions on Aspect-Oriented Software Development IIent://SD_ILS/0/SD_ILS:5119262024-05-20T08:27:25Z2024-05-20T08:27:25Zby Rashid, Awais. editor.<br/><a href="http://dx.doi.org/10.1007/11922827">http://dx.doi.org/10.1007/11922827</a><br/>Format: Electronic Resources<br/>Information Security 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115982024-05-20T08:27:25Z2024-05-20T08:27:25Zby Katsikas, Sokratis K. editor.<br/><a href="http://dx.doi.org/10.1007/11836810">http://dx.doi.org/10.1007/11836810</a><br/>Format: Electronic Resources<br/>Large Scale Management of Distributed Systems 17th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2006, Dublin, Ireland, October 23-25, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118472024-05-20T08:27:25Z2024-05-20T08:27:25Zby State, Radu. editor.<br/><a href="http://dx.doi.org/10.1007/11907466">http://dx.doi.org/10.1007/11907466</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118572024-05-20T08:27:25Z2024-05-20T08:27:25Zby Leitold, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/11909033">http://dx.doi.org/10.1007/11909033</a><br/>Format: Electronic Resources<br/>Data and Applications Security XX 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5114212024-05-20T08:27:25Z2024-05-20T08:27:25Zby Damiani, Ernesto. editor.<br/><a href="http://dx.doi.org/10.1007/11805588">http://dx.doi.org/10.1007/11805588</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116142024-05-20T08:27:25Z2024-05-20T08:27:25Zby Yang, Laurence T. editor.<br/><a href="http://dx.doi.org/10.1007/11839569">http://dx.doi.org/10.1007/11839569</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data International Provenance and Annotation Workshop, IPAW 2006, Chicago, IL, USA, May 3-5, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5117812024-05-20T08:27:25Z2024-05-20T08:27:25Zby Moreau, Luc. editor.<br/><a href="http://dx.doi.org/10.1007/11890850">http://dx.doi.org/10.1007/11890850</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119662024-05-20T08:27:25Z2024-05-20T08:27:25Zby Lai, Xuejia. editor.<br/><a href="http://dx.doi.org/10.1007/11935230">http://dx.doi.org/10.1007/11935230</a><br/>Format: Electronic Resources<br/>Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119672024-05-20T08:27:25Z2024-05-20T08:27:25Zby Ning, Peng. editor.<br/><a href="http://dx.doi.org/10.1007/11935308">http://dx.doi.org/10.1007/11935308</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - INDOCRYPT 2006 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5120002024-05-20T08:27:25Z2024-05-20T08:27:25Zby Barua, Rana. editor.<br/><a href="http://dx.doi.org/10.1007/11941378">http://dx.doi.org/10.1007/11941378</a><br/>Format: Electronic Resources<br/>Service Availability Third International Service Availability Symposium, ISAS 2006, Helsinki, Finland, May 15-16, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:5120932024-05-20T08:27:25Z2024-05-20T08:27:25Zby Penkler, Dave. editor.<br/><a href="http://dx.doi.org/10.1007/11955498">http://dx.doi.org/10.1007/11955498</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5121072024-05-20T08:27:25Z2024-05-20T08:27:25Zby Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11957454">http://dx.doi.org/10.1007/11957454</a><br/>Format: Electronic Resources<br/>Business Process Management 4th International Conference, BPM 2006, Vienna, Austria, September 5-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116232024-05-20T08:27:25Z2024-05-20T08:27:25Zby Dustdar, Schahram. editor.<br/><a href="http://dx.doi.org/10.1007/11841760">http://dx.doi.org/10.1007/11841760</a><br/>Format: Electronic Resources<br/>Secure Data Management Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116252024-05-20T08:27:25Z2024-05-20T08:27:25Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11844662">http://dx.doi.org/10.1007/11844662</a><br/>Format: Electronic Resources<br/>FM 2006: Formal Methods 14th International Symposium on Formal Methods, Hamilton, Canada, August 21-27, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5114672024-05-20T08:27:25Z2024-05-20T08:27:25Zby Misra, Jayadev. editor.<br/><a href="http://dx.doi.org/10.1007/11813040">http://dx.doi.org/10.1007/11813040</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006. Proceedings, Part Ient://SD_ILS/0/SD_ILS:5118122024-05-20T08:27:25Z2024-05-20T08:27:25Zby Gabrys, Bogdan. editor.<br/><a href="http://dx.doi.org/10.1007/11892960">http://dx.doi.org/10.1007/11892960</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks in Pattern Recognition Second IAPR Workshop, ANNPR 2006, Ulm, Germany, August 31-September 2, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115832024-05-20T08:27:25Z2024-05-20T08:27:25Zby Schwenker, Friedhelm. editor.<br/><a href="http://dx.doi.org/10.1007/11829898">http://dx.doi.org/10.1007/11829898</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5117322024-05-20T08:27:25Z2024-05-20T08:27:25Zby Górski, Janusz. editor.<br/><a href="http://dx.doi.org/10.1007/11875567">http://dx.doi.org/10.1007/11875567</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119422024-05-20T08:27:25Z2024-05-20T08:27:25Zby Rhee, Min Surp. editor.<br/><a href="http://dx.doi.org/10.1007/11927587">http://dx.doi.org/10.1007/11927587</a><br/>Format: Electronic Resources<br/>Business Process Management Workshops BPM 2006 International Workshops, BPD, BPI, ENEI, GPWW, DPM, semantics4ws, Vienna, Austria, September 4-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116022024-05-20T08:27:25Z2024-05-20T08:27:25Zby Eder, Johann. editor.<br/><a href="http://dx.doi.org/10.1007/11837862">http://dx.doi.org/10.1007/11837862</a><br/>Format: Electronic Resources<br/>Technologies for Advanced Heterogeneous Networks II Second Asian Internet Engineering Conference, AINTEC 2006, Pathumthani, Thailand, November 28-30, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119552024-05-20T08:27:25Z2024-05-20T08:27:25Zby Cho, Kenjiro. editor.<br/><a href="http://dx.doi.org/10.1007/11930181">http://dx.doi.org/10.1007/11930181</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119832024-05-20T08:27:25Z2024-05-20T08:27:25Zby Lipmaa, Helger. editor.<br/><a href="http://dx.doi.org/10.1007/11937807">http://dx.doi.org/10.1007/11937807</a><br/>Format: Electronic Resources<br/>Formal Approaches to Software Testing and Runtime Verification First Combined International Workshops, FATES 2006 and RV 2006, Seattle, WA, USA, August 15-16, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5119902024-05-20T08:27:25Z2024-05-20T08:27:25Zby Havelund, Klaus. editor.<br/><a href="http://dx.doi.org/10.1007/11940197">http://dx.doi.org/10.1007/11940197</a><br/>Format: Electronic Resources<br/>Computers and Productivity How Firms Make a General Purpose Technology Workent://SD_ILS/0/SD_ILS:5132662024-05-20T08:27:25Z2024-05-20T08:27:25Zby Hempell, Thomas. author.<br/><a href="http://dx.doi.org/10.1007/3-7908-1648-5">http://dx.doi.org/10.1007/3-7908-1648-5</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2005 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5109162024-05-20T08:27:25Z2024-05-20T08:27:25Zby Won, Dong Ho. editor.<br/><a href="http://dx.doi.org/10.1007/11734727">http://dx.doi.org/10.1007/11734727</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5109182024-05-20T08:27:25Z2024-05-20T08:27:25Zby Chen, Hsinchun. editor.<br/><a href="http://dx.doi.org/10.1007/11734628">http://dx.doi.org/10.1007/11734628</a><br/>Format: Electronic Resources<br/>Security in Pervasive Computing Third International Conference, SPC 2006, York, UK, April 18-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5109202024-05-20T08:27:25Z2024-05-20T08:27:25Zby Clark, John A. editor.<br/><a href="http://dx.doi.org/10.1007/11734666">http://dx.doi.org/10.1007/11734666</a><br/>Format: Electronic Resources<br/>Software Engineering Research and Applications Second International Conference, SERA 2004, Los Angeles, CA, USA, MAY 5-7, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5104892024-05-20T08:27:25Z2024-05-20T08:27:25Zby Dosch, Walter. editor.<br/><a href="http://dx.doi.org/10.1007/11668855">http://dx.doi.org/10.1007/11668855</a><br/>Format: Electronic Resources<br/>ECOOP 2006 – Object-Oriented Programming 20th European Conference, Nantes, France, July 3-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5113132024-05-20T08:27:25Z2024-05-20T08:27:25Zby Thomas, Dave. editor.<br/><a href="http://dx.doi.org/10.1007/11785477">http://dx.doi.org/10.1007/11785477</a><br/>Format: Electronic Resources<br/>Business Process Management Workshops BPM 2005 International Workshops, BPI, BPD, ENEI, BPRM, WSCOBPM, BPS, Nancy, France, September 5, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5107092024-05-20T08:27:25Z2024-05-20T08:27:25Zby Bussler, Christoph J. editor.<br/><a href="http://dx.doi.org/10.1007/11678564">http://dx.doi.org/10.1007/11678564</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5108252024-05-20T08:27:25Z2024-05-20T08:27:25Zby Chen, Kefei. editor.<br/><a href="http://dx.doi.org/10.1007/11689522">http://dx.doi.org/10.1007/11689522</a><br/>Format: Electronic Resources<br/>Transactions on Aspect-Oriented Software Development Ient://SD_ILS/0/SD_ILS:5108062024-05-20T08:27:25Z2024-05-20T08:27:25Zby Rashid, Awais. editor.<br/><a href="http://dx.doi.org/10.1007/11687061">http://dx.doi.org/10.1007/11687061</a><br/>Format: Electronic Resources<br/>Extreme Programming and Agile Processes in Software Engineering 7th International Conference, XP 2006, Oulu, Finland, June 17-22, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5112382024-05-20T08:27:25Z2024-05-20T08:27:25Zby Abrahamsson, Pekka. editor.<br/><a href="http://dx.doi.org/10.1007/11774129">http://dx.doi.org/10.1007/11774129</a><br/>Format: Electronic Resources<br/>Object-Oriented Metrics in Practice Using Software Metrics to Characterize, Evaluate, and Improve the Design of Object-Oriented Systemsent://SD_ILS/0/SD_ILS:5116412024-05-20T08:27:25Z2024-05-20T08:27:25Zby Lanza, Michele. author.<br/><a href="http://dx.doi.org/10.1007/3-540-39538-5">http://dx.doi.org/10.1007/3-540-39538-5</a><br/>Format: Electronic Resources<br/>Emerging Trends in Information and Communication Security International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111822024-05-20T08:27:25Z2024-05-20T08:27:25Zby Müller, Günter. editor.<br/><a href="http://dx.doi.org/10.1007/11766155">http://dx.doi.org/10.1007/11766155</a><br/>Format: Electronic Resources<br/>Refinement Techniques in Software Engineering First Pernambuco Summer School on Software Engineering, PSSE 2004, Recife, Brazil, November 23-December 5, 2004 Revised Lecturesent://SD_ILS/0/SD_ILS:5117722024-05-20T08:27:25Z2024-05-20T08:27:25Zby Cavalcanti, Ana. editor.<br/><a href="http://dx.doi.org/10.1007/11889229">http://dx.doi.org/10.1007/11889229</a><br/>Format: Electronic Resources<br/>Software Process Improvement 13th European Conference, EuroSPI 2006, Joensuu, Finland, October 11-13, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118502024-05-20T08:27:25Z2024-05-20T08:27:25Zby Richardson, Ita. editor.<br/><a href="http://dx.doi.org/10.1007/11908562">http://dx.doi.org/10.1007/11908562</a><br/>Format: Electronic Resources<br/>Managing Information Systems Security and Privacyent://SD_ILS/0/SD_ILS:5093672024-05-20T08:27:25Z2024-05-20T08:27:25Zby TrĨek, Denis. author.<br/><a href="http://dx.doi.org/10.1007/3-540-28104-5">http://dx.doi.org/10.1007/3-540-28104-5</a><br/>Format: Electronic Resources<br/>Building an Enterprise Architecture Practice Tools, Tips, Best Practices, Ready-to-Use Insightsent://SD_ILS/0/SD_ILS:5073472024-05-20T08:27:25Z2024-05-20T08:27:25Zby Berg, Martin. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4020-5606-2">http://dx.doi.org/10.1007/978-1-4020-5606-2</a><br/>Format: Electronic Resources<br/>Handbook on Architectures of Information Systemsent://SD_ILS/0/SD_ILS:5089472024-05-20T08:27:25Z2024-05-20T08:27:25Zby Bernus, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/b137905">http://dx.doi.org/10.1007/b137905</a><br/>Format: Electronic Resources<br/>Web Engineeringent://SD_ILS/0/SD_ILS:5093902024-05-20T08:27:25Z2024-05-20T08:27:25Zby Mendes, Emilia. editor.<br/><a href="http://dx.doi.org/10.1007/3-540-28218-1">http://dx.doi.org/10.1007/3-540-28218-1</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - VIETCRYPT 2006 First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:5121102024-05-20T08:27:25Z2024-05-20T08:27:25Zby Nguyen, Phong Q. editor.<br/><a href="http://dx.doi.org/10.1007/11958239">http://dx.doi.org/10.1007/11958239</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papersent://SD_ILS/0/SD_ILS:5121352024-05-20T08:27:25Z2024-05-20T08:27:25Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/11962977">http://dx.doi.org/10.1007/11962977</a><br/>Format: Electronic Resources<br/>Security and Privacy in Ad-Hoc and Sensor Networks Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5121422024-05-20T08:27:25Z2024-05-20T08:27:25Zby Buttyán, Levente. editor.<br/><a href="http://dx.doi.org/10.1007/11964254">http://dx.doi.org/10.1007/11964254</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2007 The Cryptographers’ Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5121532024-05-20T08:27:25Z2024-05-20T08:27:25Zby Abe, Masayuki. editor.<br/><a href="http://dx.doi.org/10.1007/11967668">http://dx.doi.org/10.1007/11967668</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5107492024-05-20T08:27:25Z2024-05-20T08:27:25Zby Halevi, Shai. editor.<br/><a href="http://dx.doi.org/10.1007/11681878">http://dx.doi.org/10.1007/11681878</a><br/>Format: Electronic Resources<br/>Unifying the Software Process Spectrum International Software Process Workshop, SPW 2005, Beijing, China, May 25-27, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5106702024-05-20T08:27:25Z2024-05-20T08:27:25Zby Li, Mingshu. editor.<br/><a href="http://dx.doi.org/10.1007/11608035">http://dx.doi.org/10.1007/11608035</a><br/>Format: Electronic Resources<br/>Formal Approaches to Software Testing 5th International Workshop, FATES 2005, Edinburgh, UK, July 11, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5111312024-05-20T08:27:25Z2024-05-20T08:27:25Zby Grieskamp, Wolfgang. editor.<br/><a href="http://dx.doi.org/10.1007/11759744">http://dx.doi.org/10.1007/11759744</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006. Proceedings, Part IIent://SD_ILS/0/SD_ILS:5118132024-05-20T08:27:25Z2024-05-20T08:27:25Zby Gabrys, Bogdan. editor.<br/><a href="http://dx.doi.org/10.1007/11893004">http://dx.doi.org/10.1007/11893004</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006. Proceedings, Part IIIent://SD_ILS/0/SD_ILS:5118142024-05-20T08:27:25Z2024-05-20T08:27:25Zby Gabrys, Bogdan. editor.<br/><a href="http://dx.doi.org/10.1007/11893011">http://dx.doi.org/10.1007/11893011</a><br/>Format: Electronic Resources<br/>Digital Watermarking 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119152024-05-20T08:27:25Z2024-05-20T08:27:25Zby Shi, Yun Qing. editor.<br/><a href="http://dx.doi.org/10.1007/11922841">http://dx.doi.org/10.1007/11922841</a><br/>Format: Electronic Resources<br/>Model Driven Engineering Languages and Systems 9th International Conference, MoDELS 2006, Genova, Italy, October 1-6, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5117362024-05-20T08:27:25Z2024-05-20T08:27:25Zby Nierstrasz, Oscar. editor.<br/><a href="http://dx.doi.org/10.1007/11880240">http://dx.doi.org/10.1007/11880240</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems - CHES 2006 8th International Workshop, Yokohama, Japan, October 10-13, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118172024-05-20T08:27:25Z2024-05-20T08:27:25Zby Goubin, Louis. editor.<br/><a href="http://dx.doi.org/10.1007/11894063">http://dx.doi.org/10.1007/11894063</a><br/>Format: Electronic Resources<br/>Mobile Ad-hoc and Sensor Networks Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5120152024-05-20T08:27:25Z2024-05-20T08:27:25Zby Cao, Jiannong. editor.<br/><a href="http://dx.doi.org/10.1007/11943952">http://dx.doi.org/10.1007/11943952</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security Ient://SD_ILS/0/SD_ILS:5119372024-05-20T08:27:25Z2024-05-20T08:27:25Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/11926214">http://dx.doi.org/10.1007/11926214</a><br/>Format: Electronic Resources<br/>Generative and Transformational Techniques in Software Engineering International Summer School, GTTSE 2005, Braga, Portugal, July 4-8, 2005. Revised Papersent://SD_ILS/0/SD_ILS:5117632024-05-20T08:27:25Z2024-05-20T08:27:25Zby Lämmel, Ralf. editor.<br/><a href="http://dx.doi.org/10.1007/11877028">http://dx.doi.org/10.1007/11877028</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118522024-05-20T08:27:25Z2024-05-20T08:27:25Zby Yoshiura, Hiroshi. editor.<br/><a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format: Electronic Resources<br/>Autonomic Principles of IP Operations and Management 6th IEEE International Workshop on IP Operations and Management, IPOM 2006, Dublin, Ireland, October 23-25, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5118532024-05-20T08:27:25Z2024-05-20T08:27:25Zby Parr, Gerard. editor.<br/><a href="http://dx.doi.org/10.1007/11908852">http://dx.doi.org/10.1007/11908852</a><br/>Format: Electronic Resources<br/>Trust in Technology: A Socio-Technical Perspectiveent://SD_ILS/0/SD_ILS:5068082024-05-20T08:27:25Z2024-05-20T08:27:25Zby Clarke, Karen. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-4258-2">http://dx.doi.org/10.1007/1-4020-4258-2</a><br/>Format: Electronic Resources<br/>Foundations and Applications of Mis A Model Theory Approachent://SD_ILS/0/SD_ILS:5053932024-05-20T08:27:25Z2024-05-20T08:27:25Zby Takahara, Yasuhiko. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-35840-6">http://dx.doi.org/10.1007/978-0-387-35840-6</a><br/>Format: Electronic Resources<br/>Enterprise Information Systems VIent://SD_ILS/0/SD_ILS:5065632024-05-20T08:27:25Z2024-05-20T08:27:25Zby Seruca, Isabel. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-3675-2">http://dx.doi.org/10.1007/1-4020-3675-2</a><br/>Format: Electronic Resources<br/>Information Assurance Security in the Information Environmentent://SD_ILS/0/SD_ILS:5085712024-05-20T08:27:25Z2024-05-20T08:27:25Zby Blyth, Andrew. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-489-9">http://dx.doi.org/10.1007/1-84628-489-9</a><br/>Format: Electronic Resources<br/>Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5121252024-05-20T08:27:25Z2024-05-20T08:27:25Zby Bagchi, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2006 The Cryptographers’ Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5107262024-05-20T08:27:25Z2024-05-20T08:27:25Zby Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/11605805">http://dx.doi.org/10.1007/11605805</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005. Revised Papersent://SD_ILS/0/SD_ILS:5101792024-05-20T08:27:25Z2024-05-20T08:27:25Zby Valdes, Alfonso. editor.<br/><a href="http://dx.doi.org/10.1007/11663812">http://dx.doi.org/10.1007/11663812</a><br/>Format: Electronic Resources<br/>Satellite Events at the MoDELS 2005 Conference MoDELS 2005 International Workshops Doctoral Symposium, Educators Symposium Montego Bay, Jamaica, October 2-7, 2005 Revised Selected Papersent://SD_ILS/0/SD_ILS:5101802024-05-20T08:27:25Z2024-05-20T08:27:25Zby Bruel, Jean-Michel. editor.<br/><a href="http://dx.doi.org/10.1007/11663430">http://dx.doi.org/10.1007/11663430</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5112082024-05-20T08:27:25Z2024-05-20T08:27:25Zby Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11767831">http://dx.doi.org/10.1007/11767831</a><br/>Format: Electronic Resources<br/>Rapid Integration of Software Engineering Techniques Second International Workshop, RISE 2005, Heraklion, Crete, Greece, September 8-9, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5110432024-05-20T08:27:25Z2024-05-20T08:27:25Zby Guelfi, Nicolas. editor.<br/><a href="http://dx.doi.org/10.1007/11751113">http://dx.doi.org/10.1007/11751113</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5112442024-05-20T08:27:25Z2024-05-20T08:27:25Zby Atzeni, Andrea S. editor.<br/><a href="http://dx.doi.org/10.1007/11774716">http://dx.doi.org/10.1007/11774716</a><br/>Format: Electronic Resources<br/>Model Driven Architecture – Foundations and Applications Second European Conference, ECMDA-FA 2006, Bilbao, Spain, July 10-13, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5113352024-05-20T08:27:25Z2024-05-20T08:27:25Zby Rensink, Arend. editor.<br/><a href="http://dx.doi.org/10.1007/11787044">http://dx.doi.org/10.1007/11787044</a><br/>Format: Electronic Resources<br/>Designing Smart Homes The Role of Artificial Intelligenceent://SD_ILS/0/SD_ILS:5113412024-05-20T08:27:25Z2024-05-20T08:27:25Zby Augusto, Juan Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/11788485">http://dx.doi.org/10.1007/11788485</a><br/>Format: Electronic Resources<br/>Digital Rights Management. Technologies, Issues, Challenges and Systems First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5113422024-05-20T08:27:25Z2024-05-20T08:27:25Zby Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/11787952">http://dx.doi.org/10.1007/11787952</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware & Vulnerability Assessment Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5113452024-05-20T08:27:25Z2024-05-20T08:27:25Zby Büschkes, Roland. editor.<br/><a href="http://dx.doi.org/10.1007/11790754">http://dx.doi.org/10.1007/11790754</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5112782024-05-20T08:27:25Z2024-05-20T08:27:25Zby Batten, Lynn Margaret. editor.<br/><a href="http://dx.doi.org/10.1007/11780656">http://dx.doi.org/10.1007/11780656</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 9th International Symposium, RAID 2006 Hamburg, Germany, September 20-22, 2006 Proceedingsent://SD_ILS/0/SD_ILS:5116522024-05-20T08:27:25Z2024-05-20T08:27:25Zby Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/11856214">http://dx.doi.org/10.1007/11856214</a><br/>Format: Electronic Resources<br/>Reliable Software Technologies – Ada-Europe 2006 11th Ada-Europe International Conference on Reliable Software Technologies, Porto, Portugal, June 5-9, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111902024-05-20T08:27:25Z2024-05-20T08:27:25Zby Pinho, Luís Miguel. editor.<br/><a href="http://dx.doi.org/10.1007/11767077">http://dx.doi.org/10.1007/11767077</a><br/>Format: Electronic Resources<br/>Security Protocols 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papersent://SD_ILS/0/SD_ILS:5116632024-05-20T08:27:25Z2024-05-20T08:27:25Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11861386">http://dx.doi.org/10.1007/11861386</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111992024-05-20T08:27:25Z2024-05-20T08:27:25Zby Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11767480">http://dx.doi.org/10.1007/11767480</a><br/>Format: Electronic Resources<br/>Secure Mobile Ad-hoc Networks and Sensors First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5115742024-05-20T08:27:25Z2024-05-20T08:27:25Zby Burmester, Mike. editor.<br/><a href="http://dx.doi.org/10.1007/11801412">http://dx.doi.org/10.1007/11801412</a><br/>Format: Electronic Resources<br/>Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5110072024-05-20T08:27:25Z2024-05-20T08:27:25Zby Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/11745853">http://dx.doi.org/10.1007/11745853</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5116812024-05-20T08:27:25Z2024-05-20T08:27:25Zby Gollmann, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/11863908">http://dx.doi.org/10.1007/11863908</a><br/>Format: Electronic Resources<br/>Security Management, Integrity, and Internal Control in Information Systems IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conferenceent://SD_ILS/0/SD_ILS:5050612024-05-20T08:27:25Z2024-05-20T08:27:25Zby Dowland, Paul. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-31167-X">http://dx.doi.org/10.1007/0-387-31167-X</a><br/>Format: Electronic Resources<br/>Value-Based Software Engineeringent://SD_ILS/0/SD_ILS:5095632024-05-20T08:27:25Z2024-05-20T08:27:25Zby Biffl, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/3-540-29263-2">http://dx.doi.org/10.1007/3-540-29263-2</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust Thrid International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5107202024-05-20T08:27:25Z2024-05-20T08:27:25Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/11679219">http://dx.doi.org/10.1007/11679219</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5109082024-05-20T08:27:25Z2024-05-20T08:27:25Zby Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/11733447">http://dx.doi.org/10.1007/11733447</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5108432024-05-20T08:27:25Z2024-05-20T08:27:25Zby Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/11693383">http://dx.doi.org/10.1007/11693383</a><br/>Format: Electronic Resources<br/>Information Security Applications 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5108512024-05-20T08:27:25Z2024-05-20T08:27:25Zby Song, Joo-Seok. editor.<br/><a href="http://dx.doi.org/10.1007/11604938">http://dx.doi.org/10.1007/11604938</a><br/>Format: Electronic Resources<br/>EC2ND 2005 Proceedings of the First European Conference on Computer Network Defence School of Computing, University of Glamorgan, Wales, UKent://SD_ILS/0/SD_ILS:5085312024-05-20T08:27:25Z2024-05-20T08:27:25Zby Blyth, Andrew. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-352-3">http://dx.doi.org/10.1007/1-84628-352-3</a><br/>Format: Electronic Resources<br/>Interoperability of Enterprise Software and Applicationsent://SD_ILS/0/SD_ILS:5084062024-05-20T08:27:25Z2024-05-20T08:27:25Zby Konstantas, Dimitri. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-152-0">http://dx.doi.org/10.1007/1-84628-152-0</a><br/>Format: Electronic Resources<br/>Rationale Management in Software Engineeringent://SD_ILS/0/SD_ILS:5098382024-05-20T08:27:25Z2024-05-20T08:27:25Zby Dutoit, Allen H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-30998-7">http://dx.doi.org/10.1007/978-3-540-30998-7</a><br/>Format: Electronic Resources<br/>Essential Software Architectureent://SD_ILS/0/SD_ILS:5094822024-05-20T08:27:25Z2024-05-20T08:27:25Zby Gorton, Ian. author.<br/><a href="http://dx.doi.org/10.1007/3-540-28714-0">http://dx.doi.org/10.1007/3-540-28714-0</a><br/>Format: Electronic Resources<br/>Electronic Government 5th International Conference, EGOV 2006, Kraków, Poland, September 4-8, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115442024-05-20T08:27:25Z2024-05-20T08:27:25Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/11823100">http://dx.doi.org/10.1007/11823100</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - EUROCRYPT 2006 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111602024-05-20T08:27:25Z2024-05-20T08:27:25Zby Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/11761679">http://dx.doi.org/10.1007/11761679</a><br/>Format: Electronic Resources<br/>Reuse of Off-the-Shelf Components 9th International Conference on Software Reuse, ICSR 2006 Turin, Italy, June 12-15, 2006 Proceedingsent://SD_ILS/0/SD_ILS:5111732024-05-20T08:27:25Z2024-05-20T08:27:25Zby Morisio, Maurizio. editor.<br/><a href="http://dx.doi.org/10.1007/11763864">http://dx.doi.org/10.1007/11763864</a><br/>Format: Electronic Resources<br/>Software Process Change International Software Process Workshop and International Workshop on Software Process Simulation and Modeling, SPW/ProSim 2006, Shanghai, China, May 20-21, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5110712024-05-20T08:27:25Z2024-05-20T08:27:25Zby Wang, Qing. editor.<br/><a href="http://dx.doi.org/10.1007/11754305">http://dx.doi.org/10.1007/11754305</a><br/>Format: Electronic Resources<br/>Trust and Privacy in Digital Business Third International Conference, TrustBus 2006, Kraków, Poland, September 4-8, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115662024-05-20T08:27:25Z2024-05-20T08:27:25Zby Fischer-Hübner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/11824633">http://dx.doi.org/10.1007/11824633</a><br/>Format: Electronic Resources<br/>Product-Focused Software Process Improvement 7th International Conference, PROFES 2006, Amsterdam, The Netherlands, June 12-14, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111942024-05-20T08:27:25Z2024-05-20T08:27:25Zby Münch, Jürgen. editor.<br/><a href="http://dx.doi.org/10.1007/11767718">http://dx.doi.org/10.1007/11767718</a><br/>Format: Electronic Resources<br/>Trust Management 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5110902024-05-20T08:27:25Z2024-05-20T08:27:25Zby Stølen, Ketil. editor.<br/><a href="http://dx.doi.org/10.1007/11755593">http://dx.doi.org/10.1007/11755593</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - CRYPTO 2006 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5114992024-05-20T08:27:25Z2024-05-20T08:27:25Zby Dwork, Cynthia. editor.<br/><a href="http://dx.doi.org/10.1007/11818175">http://dx.doi.org/10.1007/11818175</a><br/>Format: Electronic Resources<br/>Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5117712024-05-20T08:27:25Z2024-05-20T08:27:25Zby Breveglieri, Luca. editor.<br/><a href="http://dx.doi.org/10.1007/11889700">http://dx.doi.org/10.1007/11889700</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:5117732024-05-20T08:27:25Z2024-05-20T08:27:25Zby Crescenzo, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/11889663">http://dx.doi.org/10.1007/11889663</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5119612024-05-20T08:27:25Z2024-05-20T08:27:25Zby Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/11935070">http://dx.doi.org/10.1007/11935070</a><br/>Format: Electronic Resources<br/>