Search Results for - Narrowed by: Management of Computing and Information Systems. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026ps$003d300$0026isd$003dtrue? 2024-05-20T08:27:25Z Resources, Co-Evolution and Artifacts Theory in CSCW ent://SD_ILS/0/SD_ILS:502435 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Ackerman, Mark S. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-901-9">http://dx.doi.org/10.1007/978-1-84628-901-9</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Interoperability III New Challenges and Industrial Approaches ent://SD_ILS/0/SD_ILS:502525 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Mertins, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-221-0">http://dx.doi.org/10.1007/978-1-84800-221-0</a><br/>Format:&#160;Electronic Resources<br/> FM 2008: Formal Methods 15th International Symposium on Formal Methods, Turku, Finland, May 26-30, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502633 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68237-0">http://dx.doi.org/10.1007/978-3-540-68237-0</a><br/>Format:&#160;Electronic Resources<br/> Agile Processes in Software Engineering and Extreme Programming 9th International Conference, XP 2008, Limerick, Ireland, June 10-14, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502634 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Abrahamsson, Pekka. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68255-4">http://dx.doi.org/10.1007/978-3-540-68255-4</a><br/>Format:&#160;Electronic Resources<br/> Guide to Advanced Empirical Software Engineering ent://SD_ILS/0/SD_ILS:502468 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Shull, Forrest. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-044-5">http://dx.doi.org/10.1007/978-1-84800-044-5</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503613 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85259-9">http://dx.doi.org/10.1007/978-3-540-85259-9</a><br/>Format:&#160;Electronic Resources<br/> Balancing Agility and Formalism in Software Engineering Second IFIP TC 2 Central and East European Conference on Software Engineering Techniques, CEE-SET 2007, Poznan, Poland, October 10-12, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503615 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Meyer, Bertrand. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85279-7">http://dx.doi.org/10.1007/978-3-540-85279-7</a><br/>Format:&#160;Electronic Resources<br/> Making Globally Distributed Software Development a Success Story International Conference on Software Process, ICSP 2008 Leipzig, Germany, May 10-11, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503544 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Wang, Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79588-9">http://dx.doi.org/10.1007/978-3-540-79588-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, M&aacute;laga, Spain, October 6-8, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503749 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503753 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Buchmann, Johannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503481 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format:&#160;Electronic Resources<br/> Emerging Web Services Technology, Volume II ent://SD_ILS/0/SD_ILS:503942 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Gschwind, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-7643-8864-5">http://dx.doi.org/10.1007/978-3-7643-8864-5</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503789 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Solanki, Kaushal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2008 The Cryptographers&rsquo; Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503503 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79263-5">http://dx.doi.org/10.1007/978-3-540-79263-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503800 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502812 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70567-3">http://dx.doi.org/10.1007/978-3-540-70567-3</a><br/>Format:&#160;Electronic Resources<br/> ECOOP 2008 &ndash; Object-Oriented Programming 22nd European Conference Paphos, Cyprus, July 7-11, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502820 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Vitek, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70592-5">http://dx.doi.org/10.1007/978-3-540-70592-5</a><br/>Format:&#160;Electronic Resources<br/> Requirements Management The Interface Between Requirements Development and All Other Systems Engineering Processes ent://SD_ILS/0/SD_ILS:502646 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Hood, Colin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68476-3">http://dx.doi.org/10.1007/978-3-540-68476-3</a><br/>Format:&#160;Electronic Resources<br/> Testing of Software and Communicating Systems 20th IFIP TC 6/WG 6.1 International Conference, TestCom 2008 8th International Workshop, FATES 2008 Tokyo, Japan, June 10-13, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502652 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Suzuki, Kenji. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68524-1">http://dx.doi.org/10.1007/978-3-540-68524-1</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502756 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Mj&oslash;lsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69485-4">http://dx.doi.org/10.1007/978-3-540-69485-4</a><br/>Format:&#160;Electronic Resources<br/> Objects, Components, Models and Patterns 46th International Conference, TOOLS EUROPE 2008, Zurich, Switzerland, June 30 - July 4, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502777 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Paige, Richard F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69824-1">http://dx.doi.org/10.1007/978-3-540-69824-1</a><br/>Format:&#160;Electronic Resources<br/> Reliable Software Technologies &ndash; Ada-Europe 2008 13th Ada-Europe International Conference on Reliable Software Technologies, Venice, Italy, June 16-20, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502662 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Kordon, Fabrice. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68624-8">http://dx.doi.org/10.1007/978-3-540-68624-8</a><br/>Format:&#160;Electronic Resources<br/> Model-Driven Testing ent://SD_ILS/0/SD_ILS:502892 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Baker, Paul. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72563-3">http://dx.doi.org/10.1007/978-3-540-72563-3</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502803 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format:&#160;Electronic Resources<br/> Rightshore! Successfully SAP(R) Projects Offshore ent://SD_ILS/0/SD_ILS:503226 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Messner, Wolfgang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77288-0">http://dx.doi.org/10.1007/978-3-540-77288-0</a><br/>Format:&#160;Electronic Resources<br/> Active Knowledge Modeling of Enterprises ent://SD_ILS/0/SD_ILS:503519 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Lillehagen, Frank. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79416-5">http://dx.doi.org/10.1007/978-3-540-79416-5</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503610 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503533 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Pei, Dingyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format:&#160;Electronic Resources<br/> TestGoal Result-Driven Testing ent://SD_ILS/0/SD_ILS:503439 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;De Grood, Derk-Jan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78829-4">http://dx.doi.org/10.1007/978-3-540-78829-4</a><br/>Format:&#160;Electronic Resources<br/> Formal Methods and Testing An Outcome of the FORTEST Network, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503449 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Hierons, Robert M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78917-8">http://dx.doi.org/10.1007/978-3-540-78917-8</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503387 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part I ent://SD_ILS/0/SD_ILS:503636 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85563-7">http://dx.doi.org/10.1007/978-3-540-85563-7</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part II ent://SD_ILS/0/SD_ILS:503637 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85565-1">http://dx.doi.org/10.1007/978-3-540-85565-1</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part III ent://SD_ILS/0/SD_ILS:503638 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85567-5">http://dx.doi.org/10.1007/978-3-540-85567-5</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503821 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Franklin, Matthew K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format:&#160;Electronic Resources<br/> Biosurveillance and Biosecurity International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503831 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Zeng, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89746-0">http://dx.doi.org/10.1007/978-3-540-89746-0</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503832 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Chowdhury, Dipanwita Roy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89754-5">http://dx.doi.org/10.1007/978-3-540-89754-5</a><br/>Format:&#160;Electronic Resources<br/> Model Driven Architecture &ndash; Foundations and Applications 4th European Conference, ECMDA-FA 2008, Berlin, Germany, June 9-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502709 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Schieferdecker, Ina. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69100-6">http://dx.doi.org/10.1007/978-3-540-69100-6</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security III ent://SD_ILS/0/SD_ILS:502699 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503708 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Harrison, Michael D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503818 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Matsuura, Kanta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503649 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Furnell, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management 6th International Conference, BPM 2008, Milan, Italy, September 2-4, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503650 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85758-7">http://dx.doi.org/10.1007/978-3-540-85758-7</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, M&aacute;laga, Spain, October 3-5, 2007. Revised Papers ent://SD_ILS/0/SD_ILS:503793 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format:&#160;Electronic Resources<br/> The Practice of Enterprise Modeling First IFIP WG 8.1 Working Conference, PoEM 2008, Stockholm, Sweden, November 12-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503796 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Stirna, Janis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89218-2">http://dx.doi.org/10.1007/978-3-540-89218-2</a><br/>Format:&#160;Electronic Resources<br/> Web Services and Formal Methods 4th International Workshop, WS-FM 2007, Brisbane, Australia, September 28-29, 2007. Proceedings ent://SD_ILS/0/SD_ILS:503496 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79230-7">http://dx.doi.org/10.1007/978-3-540-79230-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Ad Hoc Networking Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25&ndash;27, 2008 ent://SD_ILS/0/SD_ILS:501523 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Cuenca, Pedro. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09490-8">http://dx.doi.org/10.1007/978-0-387-09490-8</a><br/>Format:&#160;Electronic Resources<br/> High Confidence Software Reuse in Large Systems 10th International Conference on Software Reuse, ICSR 2008, Beijing, China, May 25-29, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502613 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Mei, Hong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68073-4">http://dx.doi.org/10.1007/978-3-540-68073-4</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Collaborative Networks IFIP TC 5 WG 5.5 Ninth Working Conference on VIRTUAL ENTERPRISES, September 8-10, 2008, Poznan, Poland ent://SD_ILS/0/SD_ILS:501998 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Camarinha-Matos, Luis M. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-84837-2">http://dx.doi.org/10.1007/978-0-387-84837-2</a><br/>Format:&#160;Electronic Resources<br/> Service Availability 5th International Service Availability Symposium, ISAS 2008 Tokyo, Japan, May 19-21, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502620 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Nanya, Takashi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68129-8">http://dx.doi.org/10.1007/978-3-540-68129-8</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2008 First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502623 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68164-9">http://dx.doi.org/10.1007/978-3-540-68164-9</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502827 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection II ent://SD_ILS/0/SD_ILS:502009 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Papa, Mauricio. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-88523-0">http://dx.doi.org/10.1007/978-0-387-88523-0</a><br/>Format:&#160;Electronic Resources<br/> Advanced Methods for Inconsistent Knowledge Management ent://SD_ILS/0/SD_ILS:502434 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Nguyen, Ngoc Thanh. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-889-0">http://dx.doi.org/10.1007/978-1-84628-889-0</a><br/>Format:&#160;Electronic Resources<br/> Resilient Networks and Services Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502818 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Hausheer, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70587-1">http://dx.doi.org/10.1007/978-3-540-70587-1</a><br/>Format:&#160;Electronic Resources<br/> The IT Measurement Compendium Estimating and Benchmarking Success with Functional Size Measurement ent://SD_ILS/0/SD_ILS:502627 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Bundschuh, Manfred. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68188-5">http://dx.doi.org/10.1007/978-3-540-68188-5</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502730 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Rong, Chunming. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69295-9">http://dx.doi.org/10.1007/978-3-540-69295-9</a><br/>Format:&#160;Electronic Resources<br/> Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502750 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format:&#160;Electronic Resources<br/> Product-Focused Software Process Improvement 9th International Conference, PROFES 2008 Monte Porzio Catone, Italy, June 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502764 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Jedlitschka, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69566-0">http://dx.doi.org/10.1007/978-3-540-69566-0</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502691 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Bellovin, Steven M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks in Pattern Recognition Third IAPR Workshop, ANNPR 2008 Paris, France, July 2-4, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502791 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Prevost, Lionel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69939-2">http://dx.doi.org/10.1007/978-3-540-69939-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502793 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format:&#160;Electronic Resources<br/> Open Source Development, Communities and Quality IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:501543 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Russo, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09684-1">http://dx.doi.org/10.1007/978-0-387-09684-1</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC&rsquo;08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:501546 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Electronic Resources<br/> Requirements Engineering: Foundation for Software Quality 14th International Working Conference, REFSQ 2008 Montpellier, France, June 16-17, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502704 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Paech, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69062-7">http://dx.doi.org/10.1007/978-3-540-69062-7</a><br/>Format:&#160;Electronic Resources<br/> Models in Software Engineering Workshops and Symposia at MoDELS 2007, Nashville, TN, USA, September 30 - October 5, 2007, Reports and Revised Selected Papers ent://SD_ILS/0/SD_ILS:502706 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Giese, Holger. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69073-3">http://dx.doi.org/10.1007/978-3-540-69073-3</a><br/>Format:&#160;Electronic Resources<br/> Object-Oriented Technology. ECOOP 2007 Workshop Reader ECOOP 2007 Workshops, Berlin, Germany, July 30-31, 2007, Final Reports ent://SD_ILS/0/SD_ILS:503335 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Cebulla, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78195-0">http://dx.doi.org/10.1007/978-3-540-78195-0</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management Workshops BPM 2007 International Workshops, BPI, BPD, CBP, ProHealth, RefMod, semantics4ws, Brisbane, Australia, September 24, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503339 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Hofstede, Arthur. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78238-4">http://dx.doi.org/10.1007/978-3-540-78238-4</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503839 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503600 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Wagner, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format:&#160;Electronic Resources<br/> Data Management in Grid and Peer-to-Peer Systems First International Conference, Globe 2008, Turin, Italy, September 3, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503601 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85176-9">http://dx.doi.org/10.1007/978-3-540-85176-9</a><br/>Format:&#160;Electronic Resources<br/> Managing Large-Scale Service Deployment 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503678 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Turck, Filip. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87353-2">http://dx.doi.org/10.1007/978-3-540-87353-2</a><br/>Format:&#160;Electronic Resources<br/> Modelling Autonomic Communications Environments Third IEEE International Workshop, MACE 2008, Samos Island, Greece, September 22-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503679 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Meer, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87355-6">http://dx.doi.org/10.1007/978-3-540-87355-6</a><br/>Format:&#160;Electronic Resources<br/> IP Operations and Management 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503680 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Akar, Nail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87357-0">http://dx.doi.org/10.1007/978-3-540-87357-0</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503684 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Lippmann, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format:&#160;Electronic Resources<br/> Modelling, Computation and Optimization in Information Systems and Management Sciences Second International Conference MCO 2008, Metz, France - Luxembourg, September 8-10, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503692 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Le Thi, Hoai An. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87477-5">http://dx.doi.org/10.1007/978-3-540-87477-5</a><br/>Format:&#160;Electronic Resources<br/> Software Evolution ent://SD_ILS/0/SD_ILS:503172 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Mens, Tom. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76440-3">http://dx.doi.org/10.1007/978-3-540-76440-3</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography &ndash; PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503372 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503375 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Bonchi, Francesco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78478-4">http://dx.doi.org/10.1007/978-3-540-78478-4</a><br/>Format:&#160;Electronic Resources<br/> Emerging Technologies and Information Systems for the Knowledge Society First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503717 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Lytras, Miltiadis D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87781-3">http://dx.doi.org/10.1007/978-3-540-87781-3</a><br/>Format:&#160;Electronic Resources<br/> The Open Knowlege Society. A Computer Science and Information Systems Manifesto First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503718 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Lytras, Miltiadis D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87783-7">http://dx.doi.org/10.1007/978-3-540-87783-7</a><br/>Format:&#160;Electronic Resources<br/> Software Technologies for Embedded and Ubiquitous Systems 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503719 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Brinkschulte, Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87785-1">http://dx.doi.org/10.1007/978-3-540-87785-1</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503660 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format:&#160;Electronic Resources<br/> Provenance and Annotation of Data and Processes Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake City, UT, USA, June 17-18, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503846 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Freire, Juliana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89965-5">http://dx.doi.org/10.1007/978-3-540-89965-5</a><br/>Format:&#160;Electronic Resources<br/> Itil&reg; Version 3 at a Glance Information Quick Reference ent://SD_ILS/0/SD_ILS:501918 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Long, John O. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77393-3">http://dx.doi.org/10.1007/978-0-387-77393-3</a><br/>Format:&#160;Electronic Resources<br/> Policies and Research in Identity Management First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007 ent://SD_ILS/0/SD_ILS:501939 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Leeuw, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77996-6">http://dx.doi.org/10.1007/978-0-387-77996-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503563 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Onieva, Jose A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format:&#160;Electronic Resources<br/> Software Process and Product Measurement International Conferences IWSM 2008, Metrikon 2008, and Mensura 2008 Munich, Germany, November 18-19, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503809 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Dumke, Reiner R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89403-2">http://dx.doi.org/10.1007/978-3-540-89403-2</a><br/>Format:&#160;Electronic Resources<br/> Software Process and Product Measurement International Conference, IWSM-Mensura 2007, Palma de Mallorca, Spain, November 5-8, 2007. Revised Papers ent://SD_ILS/0/SD_ILS:503634 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Cuadrado-Gallego, Juan J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85553-8">http://dx.doi.org/10.1007/978-3-540-85553-8</a><br/>Format:&#160;Electronic Resources<br/> Model Driven Engineering Languages and Systems 11th International Conference, MoDELS 2008, Toulouse, France, September 28 - October 3, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503724 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Czarnecki, Krzysztof. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87875-9">http://dx.doi.org/10.1007/978-3-540-87875-9</a><br/>Format:&#160;Electronic Resources<br/> Rationale-Based Software Engineering ent://SD_ILS/0/SD_ILS:503270 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Burge, Janet E. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77583-6">http://dx.doi.org/10.1007/978-3-540-77583-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2008 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503455 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Smart, Nigel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78967-3">http://dx.doi.org/10.1007/978-3-540-78967-3</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503664 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Grimaud, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503586 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503843 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Ortiz-Arroyo, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89900-6">http://dx.doi.org/10.1007/978-3-540-89900-6</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 7th International Conference, EGOV 2008, Turin, Italy, August 31 - September 5, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503605 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85204-9">http://dx.doi.org/10.1007/978-3-540-85204-9</a><br/>Format:&#160;Electronic Resources<br/> Principles of Distributed Systems 12th International Conference, OPODIS 2008, Luxor, Egypt, December 15-18, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503857 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Baker, Theodore P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92221-6">http://dx.doi.org/10.1007/978-3-540-92221-6</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503805 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Kulkarni, Sandeep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89335-6">http://dx.doi.org/10.1007/978-3-540-89335-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512248 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Vadhan, Salil P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers ent://SD_ILS/0/SD_ILS:512922 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512761 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 9th International Symposium, SSS 2007 Paris, France, November 14-16, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512961 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Masuzawa, Toshimitsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76627-8">http://dx.doi.org/10.1007/978-3-540-76627-8</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence and Security International Conference, CIS 2006. Guangzhou, China, November 3-6, 2006. Revised Selected Papers ent://SD_ILS/0/SD_ILS:512782 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Wang, Yuping. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74377-4">http://dx.doi.org/10.1007/978-3-540-74377-4</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512784 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512974 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Nam, Kil-Hyun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512871 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Saglietti, Francesca. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512986 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Kurosawa, Kaoru. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513004 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512529 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512362 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71549-8">http://dx.doi.org/10.1007/978-3-540-71549-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512460 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Sauveron, Damien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format:&#160;Electronic Resources<br/> Model Driven Architecture- Foundations and Applications Third European Conference, ECMDA-FA 2007, Haifa, Israel, June 11-15, 2007, Proccedings ent://SD_ILS/0/SD_ILS:512553 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Akehurst, David H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72901-3">http://dx.doi.org/10.1007/978-3-540-72901-3</a><br/>Format:&#160;Electronic Resources<br/> Requirements Engineering: Foundation for Software Quality 13th International Working Conference, REFSQ 2007, Trondheim, Norway, June 11-12, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512581 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Sawyer, Pete. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73031-6">http://dx.doi.org/10.1007/978-3-540-73031-6</a><br/>Format:&#160;Electronic Resources<br/> Rapid Integration of Software Engineering Techniques Third International Workshop, RISE 2006, Geneva, Switzerland, September 13-15, 2006. Revised Selected Papers ent://SD_ILS/0/SD_ILS:512402 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Guelfi, Nicolas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71876-5">http://dx.doi.org/10.1007/978-3-540-71876-5</a><br/>Format:&#160;Electronic Resources<br/> Testing of Software and Communicating Systems 19th IFIP TC6/WG6.1 International Conference, TestCom 2007, 7th International Workshop, FATES 2007, Tallinn, Estonia, June 26-29, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512589 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Petrenko, Alexandre. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73066-8">http://dx.doi.org/10.1007/978-3-540-73066-8</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security II ent://SD_ILS/0/SD_ILS:512594 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73092-7">http://dx.doi.org/10.1007/978-3-540-73092-7</a><br/>Format:&#160;Electronic Resources<br/> Agile Processes in Software Engineering and Extreme Programming 8th International Conference, XP 2007, Como, Italy, June 18-22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512597 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Concas, Giulio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73101-6">http://dx.doi.org/10.1007/978-3-540-73101-6</a><br/>Format:&#160;Electronic Resources<br/> SDL 2007: Design for Dependable Systems 13th International SDL Forum Paris, France, September 18-21, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512866 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Gaudin, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74984-4">http://dx.doi.org/10.1007/978-3-540-74984-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Biometrics International Conference, ICB 2007, Seoul, Korea, August 27-29, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512803 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Lee, Seong-Whan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74549-5">http://dx.doi.org/10.1007/978-3-540-74549-5</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management 5th International Conference, BPM 2007, Brisbane, Australia, September 24-28, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512880 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Alonso, Gustavo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75183-0">http://dx.doi.org/10.1007/978-3-540-75183-0</a><br/>Format:&#160;Electronic Resources<br/> Preserving Digital Information ent://SD_ILS/0/SD_ILS:511579 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Gladney, Henry M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-37887-7">http://dx.doi.org/10.1007/978-3-540-37887-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512440 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format:&#160;Electronic Resources<br/> Service Availability 4th International Service Availability Symposium, ISAS 2007, Durham, NH, USA, May 21-22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512528 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72736-1">http://dx.doi.org/10.1007/978-3-540-72736-1</a><br/>Format:&#160;Electronic Resources<br/> Software Process Dynamics and Agility International Conference on Software Process, ICSP 2007, Minneapolis, MN, USA, May 19-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512473 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Wang, Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72426-1">http://dx.doi.org/10.1007/978-3-540-72426-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512276 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Lee, Jae Kwang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format:&#160;Electronic Resources<br/> Anti-Spam Measures Analysis and Design ent://SD_ILS/0/SD_ILS:512390 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Schryen, Guido. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71750-8">http://dx.doi.org/10.1007/978-3-540-71750-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512675 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format:&#160;Electronic Resources<br/> Product-Focused Software Process Improvement 8th International Conference, PROFES 2007, Riga, Latvia, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512676 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;M&uuml;nch, J&uuml;rgen. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73460-4">http://dx.doi.org/10.1007/978-3-540-73460-4</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513017 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77156-2">http://dx.doi.org/10.1007/978-3-540-77156-2</a><br/>Format:&#160;Electronic Resources<br/> Software Engineering Approaches for Offshore and Outsourced Development First International Conference, SEAFOOD 2007, Zurich, Switzerland, February 5-6, 2007. Revised Papers ent://SD_ILS/0/SD_ILS:512920 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Meyer, Bertrand. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75542-5">http://dx.doi.org/10.1007/978-3-540-75542-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 &mdash; 26, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512846 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Biskup, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513032 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Adams, Carlisle. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format:&#160;Electronic Resources<br/> Runtime Verification 7th International Workshop, RV 2007, Vancover, Canada, March 13, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513036 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Sokolsky, Oleg. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77395-5">http://dx.doi.org/10.1007/978-3-540-77395-5</a><br/>Format:&#160;Electronic Resources<br/> E-Voting and Identity First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513040 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Alkassar, Ammar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77493-8">http://dx.doi.org/10.1007/978-3-540-77493-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513042 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Okada, Mitsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77505-8">http://dx.doi.org/10.1007/978-3-540-77505-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513043 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Kim, Sehun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77535-5">http://dx.doi.org/10.1007/978-3-540-77535-5</a><br/>Format:&#160;Electronic Resources<br/> Sustainable Internet Third Asian Internet Engineering Conference, AINTEC 2007, Phuket, Thailand, November 27-29, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512976 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Fdida, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76809-8">http://dx.doi.org/10.1007/978-3-540-76809-8</a><br/>Format:&#160;Electronic Resources<br/> Early Aspects: Current Challenges and Future Directions 10th International Workshop, Vancouver, Canada, March 13, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512977 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Moreira, Ana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76811-1">http://dx.doi.org/10.1007/978-3-540-76811-1</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Aspect-Oriented Software Development III ent://SD_ILS/0/SD_ILS:512878 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Rashid, Awais. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75162-5">http://dx.doi.org/10.1007/978-3-540-75162-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer Science &ndash; ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512989 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Cervesato, Iliano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512991 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Bao, Feng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76969-9">http://dx.doi.org/10.1007/978-3-540-76969-9</a><br/>Format:&#160;Electronic Resources<br/> Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512998 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Zhang, Hongke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2007 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512999 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Srinathan, K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77026-8">http://dx.doi.org/10.1007/978-3-540-77026-8</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Aspect-Oriented Software Development IV ent://SD_ILS/0/SD_ILS:513002 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Rashid, Awais. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77042-8">http://dx.doi.org/10.1007/978-3-540-77042-8</a><br/>Format:&#160;Electronic Resources<br/> Model Driven Engineering Languages and Systems 10th International Conference, MoDELS 2007, Nashville, USA, September 30 - October 5, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512884 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Engels, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75209-7">http://dx.doi.org/10.1007/978-3-540-75209-7</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513007 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;McDaniel, Patrick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 6th International Conference, EGOV 2007, Regensburg, Germany, September 3-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512788 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74444-3">http://dx.doi.org/10.1007/978-3-540-74444-3</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:512793 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Biham, Eli. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format:&#160;Electronic Resources<br/> Models in Software Engineering Workshops and Symposia at MoDELS 2006, Genoa, Italy, October 1-6, 2006, Reports and Revised Selected Papers ent://SD_ILS/0/SD_ILS:512164 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;K&uuml;hne, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69489-2">http://dx.doi.org/10.1007/978-3-540-69489-2</a><br/>Format:&#160;Electronic Resources<br/> Software Product Lines in Action The Best Industrial Practice in Product Line Engineering ent://SD_ILS/0/SD_ILS:512341 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Linden, Frank. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71437-8">http://dx.doi.org/10.1007/978-3-540-71437-8</a><br/>Format:&#160;Electronic Resources<br/> Active Networks IFIP TC6 6th International Working Conference, IWAN 2004, Lawrence, KS, USA, October 27-29, 2004. Revised Papers ent://SD_ILS/0/SD_ILS:512352 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Minden, Gary J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71500-9">http://dx.doi.org/10.1007/978-3-540-71500-9</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics: Biosurveillance Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May 22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512504 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Zeng, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72608-1">http://dx.doi.org/10.1007/978-3-540-72608-1</a><br/>Format:&#160;Electronic Resources<br/> Reliable Software Technologies &ndash; Ada Europe 2007 12th Ada-Europe International Conference on Reliable Software Technologies, Geneva, Switzerland, June 25-29, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512621 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Abdennadher, Nabil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73230-3">http://dx.doi.org/10.1007/978-3-540-73230-3</a><br/>Format:&#160;Electronic Resources<br/> Software Measurement Establish &mdash; Extract &mdash; Evaluate &mdash; Execute ent://SD_ILS/0/SD_ILS:512378 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Ebert, Christof. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71649-5">http://dx.doi.org/10.1007/978-3-540-71649-5</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography &ndash; PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512381 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Okamoto, Tatsuaki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format:&#160;Electronic Resources<br/> Online Communities and Social Computing Second International Conference, OCSC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512623 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Schuler, Douglas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73257-0">http://dx.doi.org/10.1007/978-3-540-73257-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512626 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Format:&#160;Electronic Resources<br/> Inter-Domain Management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512572 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Bandara, Arosha K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72986-0">http://dx.doi.org/10.1007/978-3-540-72986-0</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design IV FOSAD 2006/2007 Tutorial Lectures ent://SD_ILS/0/SD_ILS:512837 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74810-6">http://dx.doi.org/10.1007/978-3-540-74810-6</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part I ent://SD_ILS/0/SD_ILS:512840 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Apolloni, Bruno. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74819-9">http://dx.doi.org/10.1007/978-3-540-74819-9</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part II ent://SD_ILS/0/SD_ILS:512843 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Apolloni, Bruno. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74827-4">http://dx.doi.org/10.1007/978-3-540-74827-4</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part III ent://SD_ILS/0/SD_ILS:512844 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Apolloni, Bruno. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74829-8">http://dx.doi.org/10.1007/978-3-540-74829-8</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512888 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">http://dx.doi.org/10.1007/978-3-540-75227-1</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512889 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75248-6">http://dx.doi.org/10.1007/978-3-540-75248-6</a><br/>Format:&#160;Electronic Resources<br/> Spatial Database Systems Design, Implementation and Project Management ent://SD_ILS/0/SD_ILS:507259 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Yeung, Albert K. W. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-5392-4">http://dx.doi.org/10.1007/1-4020-5392-4</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Interoperability New Challenges and Approaches ent://SD_ILS/0/SD_ILS:508649 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Doumeingts, Guy. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-714-5">http://dx.doi.org/10.1007/978-1-84628-714-5</a><br/>Format:&#160;Electronic Resources<br/> Network-Centric Service-Oriented Enterprise ent://SD_ILS/0/SD_ILS:507651 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Chang, William Y. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4020-6456-2">http://dx.doi.org/10.1007/978-1-4020-6456-2</a><br/>Format:&#160;Electronic Resources<br/> Organizational Dynamics of Technology-Based Innovation: Diversifying the Research Agenda IFIP TC 8 WG 8.6 International Working Conference, June 14&ndash;16, Manchester, UK ent://SD_ILS/0/SD_ILS:506005 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;McMaster, Tom. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72804-9">http://dx.doi.org/10.1007/978-0-387-72804-9</a><br/>Format:&#160;Electronic Resources<br/> Software Process Improvement 14th European Conference, EuroSPI 2007, Potsdam, Germany, September 26-28, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512902 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Abrahamsson, Pekka. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75381-0">http://dx.doi.org/10.1007/978-3-540-75381-0</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Interoperability II New Challenges and Approaches ent://SD_ILS/0/SD_ILS:508702 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Gon&ccedil;alves, Ricardo J. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-858-6">http://dx.doi.org/10.1007/978-1-84628-858-6</a><br/>Format:&#160;Electronic Resources<br/> Grid Computing Security ent://SD_ILS/0/SD_ILS:511672 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Chakrabarti, Anirban. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Action Research An Applied View of Emerging Concepts and Methods ent://SD_ILS/0/SD_ILS:505403 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Kock, Ned. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36060-7">http://dx.doi.org/10.1007/978-0-387-36060-7</a><br/>Format:&#160;Electronic Resources<br/> Digital Decision Making Back to the Future ent://SD_ILS/0/SD_ILS:508632 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Corrigan, Ray. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-673-5">http://dx.doi.org/10.1007/978-1-84628-673-5</a><br/>Format:&#160;Electronic Resources<br/> Metagraphs and Their Applications ent://SD_ILS/0/SD_ILS:505472 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Basu, Amit. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-37234-1">http://dx.doi.org/10.1007/978-0-387-37234-1</a><br/>Format:&#160;Electronic Resources<br/> EC2ND 2006 Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Faculty of Advanced Technology, University of Glamorgan, Wales, UK ent://SD_ILS/0/SD_ILS:508664 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Blyth, Andrew. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-750-3">http://dx.doi.org/10.1007/978-1-84628-750-3</a><br/>Format:&#160;Electronic Resources<br/> Guerrilla Capacity Planning A Tactical Approach to Planning for Highly Scalable Applications and Services ent://SD_ILS/0/SD_ILS:509840 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Gunther, Neil J. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-31010-5">http://dx.doi.org/10.1007/978-3-540-31010-5</a><br/>Format:&#160;Electronic Resources<br/> Business Information Systems 10th International Conference, BIS 2007, Poznan, Poland, April 25-27, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512429 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Abramowicz, Witold. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72035-5">http://dx.doi.org/10.1007/978-3-540-72035-5</a><br/>Format:&#160;Electronic Resources<br/> Successfully Implementing Microsoft Dynamics&trade; by Using the Regatta&reg; Approach for Microsoft Dynamics&trade; ent://SD_ILS/0/SD_ILS:512370 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Koop, Reinder. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71593-1">http://dx.doi.org/10.1007/978-3-540-71593-1</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512660 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73408-6">http://dx.doi.org/10.1007/978-3-540-73408-6</a><br/>Format:&#160;Electronic Resources<br/> Object-Oriented Technology. ECOOP 2006 Workshop Reader ECOOP 2006 Workshops, Nantes, France, July 3-7, 2006, Final Reports ent://SD_ILS/0/SD_ILS:512391 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;S&uuml;dholt, Mario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71774-4">http://dx.doi.org/10.1007/978-3-540-71774-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512492 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Naor, Moni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72540-4">http://dx.doi.org/10.1007/978-3-540-72540-4</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems - CHES 2007 9th International Workshop, Vienna, Austria, September 10-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512825 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Paillier, Pascal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74735-2">http://dx.doi.org/10.1007/978-3-540-74735-2</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security XXI 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512687 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Barker, Steve. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73538-0">http://dx.doi.org/10.1007/978-3-540-73538-0</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512690 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Xiao, Bin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73547-2">http://dx.doi.org/10.1007/978-3-540-73547-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512927 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Miyaji, Atsuko. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format:&#160;Electronic Resources<br/> Software Technologies for Embedded and Ubiquitous Systems 5th IFIP WG 10.2 International Workshop, SEUS 2007, Santorini Island, Greece, May 2007. Revised Papers ent://SD_ILS/0/SD_ILS:512928 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Obermaisser, Roman. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75664-4">http://dx.doi.org/10.1007/978-3-540-75664-4</a><br/>Format:&#160;Electronic Resources<br/> Business Intelligence for the Real-Time Enterprises First International Workshop, BIRTE 2006, Seoul, Korea, September 11, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512739 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Bussler, Christoph. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73950-0">http://dx.doi.org/10.1007/978-3-540-73950-0</a><br/>Format:&#160;Electronic Resources<br/> ECOOP 2007 &ndash; Object-Oriented Programming 21st European Conference, Berlin, Germany, July 30 - August 3, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512699 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Ernst, Erik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73589-2">http://dx.doi.org/10.1007/978-3-540-73589-2</a><br/>Format:&#160;Electronic Resources<br/> Managing Virtualization of Networks and Services 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San Jos&eacute;, CA, USA, October 29-31, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512933 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Clemm, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75694-1">http://dx.doi.org/10.1007/978-3-540-75694-1</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512703 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;H&auml;mmerli, Bernhard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Format:&#160;Electronic Resources<br/> IP Operations and Management 7th IEEE International Workshop, IPOM 2007 San Jos&eacute;, USA, October 31 - November 2, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512942 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Medhi, Deep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75853-2">http://dx.doi.org/10.1007/978-3-540-75853-2</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers ent://SD_ILS/0/SD_ILS:513033 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Hybrid Information Technology First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513034 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Szczuka, Marcin S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77368-9">http://dx.doi.org/10.1007/978-3-540-77368-9</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513035 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Furon, Teddy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77370-2">http://dx.doi.org/10.1007/978-3-540-77370-2</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers ent://SD_ILS/0/SD_ILS:512756 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Camenisch, Jan L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Intrusion Detection 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512777 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Kruegel, Christopher. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74320-0">http://dx.doi.org/10.1007/978-3-540-74320-0</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511137 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Mehrotra, Sharad. editor.<br/><a href="http://dx.doi.org/10.1007/11760146">http://dx.doi.org/10.1007/11760146</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511586 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Prisco, Roberto. editor.<br/><a href="http://dx.doi.org/10.1007/11832072">http://dx.doi.org/10.1007/11832072</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Aspect-Oriented Software Development II ent://SD_ILS/0/SD_ILS:511926 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Rashid, Awais. editor.<br/><a href="http://dx.doi.org/10.1007/11922827">http://dx.doi.org/10.1007/11922827</a><br/>Format:&#160;Electronic Resources<br/> Information Security 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511598 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Katsikas, Sokratis K. editor.<br/><a href="http://dx.doi.org/10.1007/11836810">http://dx.doi.org/10.1007/11836810</a><br/>Format:&#160;Electronic Resources<br/> Large Scale Management of Distributed Systems 17th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2006, Dublin, Ireland, October 23-25, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511847 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;State, Radu. editor.<br/><a href="http://dx.doi.org/10.1007/11907466">http://dx.doi.org/10.1007/11907466</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511857 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Leitold, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/11909033">http://dx.doi.org/10.1007/11909033</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security XX 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511421 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Damiani, Ernesto. editor.<br/><a href="http://dx.doi.org/10.1007/11805588">http://dx.doi.org/10.1007/11805588</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511614 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Yang, Laurence T. editor.<br/><a href="http://dx.doi.org/10.1007/11839569">http://dx.doi.org/10.1007/11839569</a><br/>Format:&#160;Electronic Resources<br/> Provenance and Annotation of Data International Provenance and Annotation Workshop, IPAW 2006, Chicago, IL, USA, May 3-5, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:511781 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Moreau, Luc. editor.<br/><a href="http://dx.doi.org/10.1007/11890850">http://dx.doi.org/10.1007/11890850</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2006 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511966 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Lai, Xuejia. editor.<br/><a href="http://dx.doi.org/10.1007/11935230">http://dx.doi.org/10.1007/11935230</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511967 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Ning, Peng. editor.<br/><a href="http://dx.doi.org/10.1007/11935308">http://dx.doi.org/10.1007/11935308</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - INDOCRYPT 2006 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings ent://SD_ILS/0/SD_ILS:512000 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Barua, Rana. editor.<br/><a href="http://dx.doi.org/10.1007/11941378">http://dx.doi.org/10.1007/11941378</a><br/>Format:&#160;Electronic Resources<br/> Service Availability Third International Service Availability Symposium, ISAS 2006, Helsinki, Finland, May 15-16, 2006. Revised Selected Papers ent://SD_ILS/0/SD_ILS:512093 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Penkler, Dave. editor.<br/><a href="http://dx.doi.org/10.1007/11955498">http://dx.doi.org/10.1007/11955498</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512107 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11957454">http://dx.doi.org/10.1007/11957454</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management 4th International Conference, BPM 2006, Vienna, Austria, September 5-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511623 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Dustdar, Schahram. editor.<br/><a href="http://dx.doi.org/10.1007/11841760">http://dx.doi.org/10.1007/11841760</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511625 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11844662">http://dx.doi.org/10.1007/11844662</a><br/>Format:&#160;Electronic Resources<br/> FM 2006: Formal Methods 14th International Symposium on Formal Methods, Hamilton, Canada, August 21-27, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511467 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Misra, Jayadev. editor.<br/><a href="http://dx.doi.org/10.1007/11813040">http://dx.doi.org/10.1007/11813040</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006. Proceedings, Part I ent://SD_ILS/0/SD_ILS:511812 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Gabrys, Bogdan. editor.<br/><a href="http://dx.doi.org/10.1007/11892960">http://dx.doi.org/10.1007/11892960</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks in Pattern Recognition Second IAPR Workshop, ANNPR 2006, Ulm, Germany, August 31-September 2, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511583 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Schwenker, Friedhelm. editor.<br/><a href="http://dx.doi.org/10.1007/11829898">http://dx.doi.org/10.1007/11829898</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511732 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;G&oacute;rski, Janusz. editor.<br/><a href="http://dx.doi.org/10.1007/11875567">http://dx.doi.org/10.1007/11875567</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology &ndash; ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511942 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Rhee, Min Surp. editor.<br/><a href="http://dx.doi.org/10.1007/11927587">http://dx.doi.org/10.1007/11927587</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management Workshops BPM 2006 International Workshops, BPD, BPI, ENEI, GPWW, DPM, semantics4ws, Vienna, Austria, September 4-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511602 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Eder, Johann. editor.<br/><a href="http://dx.doi.org/10.1007/11837862">http://dx.doi.org/10.1007/11837862</a><br/>Format:&#160;Electronic Resources<br/> Technologies for Advanced Heterogeneous Networks II Second Asian Internet Engineering Conference, AINTEC 2006, Pathumthani, Thailand, November 28-30, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511955 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Cho, Kenjiro. editor.<br/><a href="http://dx.doi.org/10.1007/11930181">http://dx.doi.org/10.1007/11930181</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511983 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Lipmaa, Helger. editor.<br/><a href="http://dx.doi.org/10.1007/11937807">http://dx.doi.org/10.1007/11937807</a><br/>Format:&#160;Electronic Resources<br/> Formal Approaches to Software Testing and Runtime Verification First Combined International Workshops, FATES 2006 and RV 2006, Seattle, WA, USA, August 15-16, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:511990 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Havelund, Klaus. editor.<br/><a href="http://dx.doi.org/10.1007/11940197">http://dx.doi.org/10.1007/11940197</a><br/>Format:&#160;Electronic Resources<br/> Computers and Productivity How Firms Make a General Purpose Technology Work ent://SD_ILS/0/SD_ILS:513266 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Hempell, Thomas. author.<br/><a href="http://dx.doi.org/10.1007/3-7908-1648-5">http://dx.doi.org/10.1007/3-7908-1648-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2005 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510916 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Won, Dong Ho. editor.<br/><a href="http://dx.doi.org/10.1007/11734727">http://dx.doi.org/10.1007/11734727</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510918 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Chen, Hsinchun. editor.<br/><a href="http://dx.doi.org/10.1007/11734628">http://dx.doi.org/10.1007/11734628</a><br/>Format:&#160;Electronic Resources<br/> Security in Pervasive Computing Third International Conference, SPC 2006, York, UK, April 18-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510920 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Clark, John A. editor.<br/><a href="http://dx.doi.org/10.1007/11734666">http://dx.doi.org/10.1007/11734666</a><br/>Format:&#160;Electronic Resources<br/> Software Engineering Research and Applications Second International Conference, SERA 2004, Los Angeles, CA, USA, MAY 5-7, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510489 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Dosch, Walter. editor.<br/><a href="http://dx.doi.org/10.1007/11668855">http://dx.doi.org/10.1007/11668855</a><br/>Format:&#160;Electronic Resources<br/> ECOOP 2006 &ndash; Object-Oriented Programming 20th European Conference, Nantes, France, July 3-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511313 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Thomas, Dave. editor.<br/><a href="http://dx.doi.org/10.1007/11785477">http://dx.doi.org/10.1007/11785477</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management Workshops BPM 2005 International Workshops, BPI, BPD, ENEI, BPRM, WSCOBPM, BPS, Nancy, France, September 5, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:510709 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Bussler, Christoph J. editor.<br/><a href="http://dx.doi.org/10.1007/11678564">http://dx.doi.org/10.1007/11678564</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510825 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Chen, Kefei. editor.<br/><a href="http://dx.doi.org/10.1007/11689522">http://dx.doi.org/10.1007/11689522</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Aspect-Oriented Software Development I ent://SD_ILS/0/SD_ILS:510806 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Rashid, Awais. editor.<br/><a href="http://dx.doi.org/10.1007/11687061">http://dx.doi.org/10.1007/11687061</a><br/>Format:&#160;Electronic Resources<br/> Extreme Programming and Agile Processes in Software Engineering 7th International Conference, XP 2006, Oulu, Finland, June 17-22, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511238 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Abrahamsson, Pekka. editor.<br/><a href="http://dx.doi.org/10.1007/11774129">http://dx.doi.org/10.1007/11774129</a><br/>Format:&#160;Electronic Resources<br/> Object-Oriented Metrics in Practice Using Software Metrics to Characterize, Evaluate, and Improve the Design of Object-Oriented Systems ent://SD_ILS/0/SD_ILS:511641 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Lanza, Michele. author.<br/><a href="http://dx.doi.org/10.1007/3-540-39538-5">http://dx.doi.org/10.1007/3-540-39538-5</a><br/>Format:&#160;Electronic Resources<br/> Emerging Trends in Information and Communication Security International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511182 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;M&uuml;ller, G&uuml;nter. editor.<br/><a href="http://dx.doi.org/10.1007/11766155">http://dx.doi.org/10.1007/11766155</a><br/>Format:&#160;Electronic Resources<br/> Refinement Techniques in Software Engineering First Pernambuco Summer School on Software Engineering, PSSE 2004, Recife, Brazil, November 23-December 5, 2004 Revised Lectures ent://SD_ILS/0/SD_ILS:511772 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Cavalcanti, Ana. editor.<br/><a href="http://dx.doi.org/10.1007/11889229">http://dx.doi.org/10.1007/11889229</a><br/>Format:&#160;Electronic Resources<br/> Software Process Improvement 13th European Conference, EuroSPI 2006, Joensuu, Finland, October 11-13, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511850 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Richardson, Ita. editor.<br/><a href="http://dx.doi.org/10.1007/11908562">http://dx.doi.org/10.1007/11908562</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Systems Security and Privacy ent://SD_ILS/0/SD_ILS:509367 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;TrĨek, Denis. author.<br/><a href="http://dx.doi.org/10.1007/3-540-28104-5">http://dx.doi.org/10.1007/3-540-28104-5</a><br/>Format:&#160;Electronic Resources<br/> Building an Enterprise Architecture Practice Tools, Tips, Best Practices, Ready-to-Use Insights ent://SD_ILS/0/SD_ILS:507347 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Berg, Martin. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4020-5606-2">http://dx.doi.org/10.1007/978-1-4020-5606-2</a><br/>Format:&#160;Electronic Resources<br/> Handbook on Architectures of Information Systems ent://SD_ILS/0/SD_ILS:508947 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Bernus, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/b137905">http://dx.doi.org/10.1007/b137905</a><br/>Format:&#160;Electronic Resources<br/> Web Engineering ent://SD_ILS/0/SD_ILS:509390 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Mendes, Emilia. editor.<br/><a href="http://dx.doi.org/10.1007/3-540-28218-1">http://dx.doi.org/10.1007/3-540-28218-1</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - VIETCRYPT 2006 First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006. Revised Selected Papers ent://SD_ILS/0/SD_ILS:512110 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Nguyen, Phong Q. editor.<br/><a href="http://dx.doi.org/10.1007/11958239">http://dx.doi.org/10.1007/11958239</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papers ent://SD_ILS/0/SD_ILS:512135 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/11962977">http://dx.doi.org/10.1007/11962977</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Ad-Hoc and Sensor Networks Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512142 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Butty&aacute;n, Levente. editor.<br/><a href="http://dx.doi.org/10.1007/11964254">http://dx.doi.org/10.1007/11964254</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2007 The Cryptographers&rsquo; Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512153 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Abe, Masayuki. editor.<br/><a href="http://dx.doi.org/10.1007/11967668">http://dx.doi.org/10.1007/11967668</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510749 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Halevi, Shai. editor.<br/><a href="http://dx.doi.org/10.1007/11681878">http://dx.doi.org/10.1007/11681878</a><br/>Format:&#160;Electronic Resources<br/> Unifying the Software Process Spectrum International Software Process Workshop, SPW 2005, Beijing, China, May 25-27, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510670 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Li, Mingshu. editor.<br/><a href="http://dx.doi.org/10.1007/11608035">http://dx.doi.org/10.1007/11608035</a><br/>Format:&#160;Electronic Resources<br/> Formal Approaches to Software Testing 5th International Workshop, FATES 2005, Edinburgh, UK, July 11, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:511131 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Grieskamp, Wolfgang. editor.<br/><a href="http://dx.doi.org/10.1007/11759744">http://dx.doi.org/10.1007/11759744</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006. Proceedings, Part II ent://SD_ILS/0/SD_ILS:511813 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Gabrys, Bogdan. editor.<br/><a href="http://dx.doi.org/10.1007/11893004">http://dx.doi.org/10.1007/11893004</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006. Proceedings, Part III ent://SD_ILS/0/SD_ILS:511814 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Gabrys, Bogdan. editor.<br/><a href="http://dx.doi.org/10.1007/11893011">http://dx.doi.org/10.1007/11893011</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511915 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Shi, Yun Qing. editor.<br/><a href="http://dx.doi.org/10.1007/11922841">http://dx.doi.org/10.1007/11922841</a><br/>Format:&#160;Electronic Resources<br/> Model Driven Engineering Languages and Systems 9th International Conference, MoDELS 2006, Genova, Italy, October 1-6, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511736 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Nierstrasz, Oscar. editor.<br/><a href="http://dx.doi.org/10.1007/11880240">http://dx.doi.org/10.1007/11880240</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems - CHES 2006 8th International Workshop, Yokohama, Japan, October 10-13, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511817 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Goubin, Louis. editor.<br/><a href="http://dx.doi.org/10.1007/11894063">http://dx.doi.org/10.1007/11894063</a><br/>Format:&#160;Electronic Resources<br/> Mobile Ad-hoc and Sensor Networks Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006. Proceedings ent://SD_ILS/0/SD_ILS:512015 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Cao, Jiannong. editor.<br/><a href="http://dx.doi.org/10.1007/11943952">http://dx.doi.org/10.1007/11943952</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security I ent://SD_ILS/0/SD_ILS:511937 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/11926214">http://dx.doi.org/10.1007/11926214</a><br/>Format:&#160;Electronic Resources<br/> Generative and Transformational Techniques in Software Engineering International Summer School, GTTSE 2005, Braga, Portugal, July 4-8, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:511763 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;L&auml;mmel, Ralf. editor.<br/><a href="http://dx.doi.org/10.1007/11877028">http://dx.doi.org/10.1007/11877028</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511852 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Yoshiura, Hiroshi. editor.<br/><a href="http://dx.doi.org/10.1007/11908739">http://dx.doi.org/10.1007/11908739</a><br/>Format:&#160;Electronic Resources<br/> Autonomic Principles of IP Operations and Management 6th IEEE International Workshop on IP Operations and Management, IPOM 2006, Dublin, Ireland, October 23-25, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511853 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Parr, Gerard. editor.<br/><a href="http://dx.doi.org/10.1007/11908852">http://dx.doi.org/10.1007/11908852</a><br/>Format:&#160;Electronic Resources<br/> Trust in Technology: A Socio-Technical Perspective ent://SD_ILS/0/SD_ILS:506808 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Clarke, Karen. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-4258-2">http://dx.doi.org/10.1007/1-4020-4258-2</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Applications of Mis A Model Theory Approach ent://SD_ILS/0/SD_ILS:505393 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Takahara, Yasuhiko. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-35840-6">http://dx.doi.org/10.1007/978-0-387-35840-6</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Information Systems VI ent://SD_ILS/0/SD_ILS:506563 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Seruca, Isabel. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-3675-2">http://dx.doi.org/10.1007/1-4020-3675-2</a><br/>Format:&#160;Electronic Resources<br/> Information Assurance Security in the Information Environment ent://SD_ILS/0/SD_ILS:508571 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Blyth, Andrew. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-489-9">http://dx.doi.org/10.1007/1-84628-489-9</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:512125 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Bagchi, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2006 The Cryptographers&rsquo; Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510726 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/11605805">http://dx.doi.org/10.1007/11605805</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Intrusion Detection 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:510179 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Valdes, Alfonso. editor.<br/><a href="http://dx.doi.org/10.1007/11663812">http://dx.doi.org/10.1007/11663812</a><br/>Format:&#160;Electronic Resources<br/> Satellite Events at the MoDELS 2005 Conference MoDELS 2005 International Workshops Doctoral Symposium, Educators Symposium Montego Bay, Jamaica, October 2-7, 2005 Revised Selected Papers ent://SD_ILS/0/SD_ILS:510180 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Bruel, Jean-Michel. editor.<br/><a href="http://dx.doi.org/10.1007/11663430">http://dx.doi.org/10.1007/11663430</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:511208 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11767831">http://dx.doi.org/10.1007/11767831</a><br/>Format:&#160;Electronic Resources<br/> Rapid Integration of Software Engineering Techniques Second International Workshop, RISE 2005, Heraklion, Crete, Greece, September 8-9, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:511043 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Guelfi, Nicolas. editor.<br/><a href="http://dx.doi.org/10.1007/11751113">http://dx.doi.org/10.1007/11751113</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511244 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Atzeni, Andrea S. editor.<br/><a href="http://dx.doi.org/10.1007/11774716">http://dx.doi.org/10.1007/11774716</a><br/>Format:&#160;Electronic Resources<br/> Model Driven Architecture &ndash; Foundations and Applications Second European Conference, ECMDA-FA 2006, Bilbao, Spain, July 10-13, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511335 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Rensink, Arend. editor.<br/><a href="http://dx.doi.org/10.1007/11787044">http://dx.doi.org/10.1007/11787044</a><br/>Format:&#160;Electronic Resources<br/> Designing Smart Homes The Role of Artificial Intelligence ent://SD_ILS/0/SD_ILS:511341 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Augusto, Juan Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/11788485">http://dx.doi.org/10.1007/11788485</a><br/>Format:&#160;Electronic Resources<br/> Digital Rights Management. Technologies, Issues, Challenges and Systems First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:511342 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/11787952">http://dx.doi.org/10.1007/11787952</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware &amp; Vulnerability Assessment Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511345 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;B&uuml;schkes, Roland. editor.<br/><a href="http://dx.doi.org/10.1007/11790754">http://dx.doi.org/10.1007/11790754</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511278 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Batten, Lynn Margaret. editor.<br/><a href="http://dx.doi.org/10.1007/11780656">http://dx.doi.org/10.1007/11780656</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Intrusion Detection 9th International Symposium, RAID 2006 Hamburg, Germany, September 20-22, 2006 Proceedings ent://SD_ILS/0/SD_ILS:511652 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/11856214">http://dx.doi.org/10.1007/11856214</a><br/>Format:&#160;Electronic Resources<br/> Reliable Software Technologies &ndash; Ada-Europe 2006 11th Ada-Europe International Conference on Reliable Software Technologies, Porto, Portugal, June 5-9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511190 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Pinho, Lu&iacute;s Miguel. editor.<br/><a href="http://dx.doi.org/10.1007/11767077">http://dx.doi.org/10.1007/11767077</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:511663 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/11861386">http://dx.doi.org/10.1007/11861386</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511199 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11767480">http://dx.doi.org/10.1007/11767480</a><br/>Format:&#160;Electronic Resources<br/> Secure Mobile Ad-hoc Networks and Sensors First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:511574 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Burmester, Mike. editor.<br/><a href="http://dx.doi.org/10.1007/11801412">http://dx.doi.org/10.1007/11801412</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511007 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/11745853">http://dx.doi.org/10.1007/11745853</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511681 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Gollmann, Dieter. editor.<br/><a href="http://dx.doi.org/10.1007/11863908">http://dx.doi.org/10.1007/11863908</a><br/>Format:&#160;Electronic Resources<br/> Security Management, Integrity, and Internal Control in Information Systems IFIP TC-11 WG 11.1 &amp; WG 11.5 Joint Working Conference ent://SD_ILS/0/SD_ILS:505061 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Dowland, Paul. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-31167-X">http://dx.doi.org/10.1007/0-387-31167-X</a><br/>Format:&#160;Electronic Resources<br/> Value-Based Software Engineering ent://SD_ILS/0/SD_ILS:509563 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Biffl, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/3-540-29263-2">http://dx.doi.org/10.1007/3-540-29263-2</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects in Security and Trust Thrid International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510720 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/11679219">http://dx.doi.org/10.1007/11679219</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510908 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Domingo-Ferrer, Josep. editor.<br/><a href="http://dx.doi.org/10.1007/11733447">http://dx.doi.org/10.1007/11733447</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510843 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/11693383">http://dx.doi.org/10.1007/11693383</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510851 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Song, Joo-Seok. editor.<br/><a href="http://dx.doi.org/10.1007/11604938">http://dx.doi.org/10.1007/11604938</a><br/>Format:&#160;Electronic Resources<br/> EC2ND 2005 Proceedings of the First European Conference on Computer Network Defence School of Computing, University of Glamorgan, Wales, UK ent://SD_ILS/0/SD_ILS:508531 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Blyth, Andrew. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-352-3">http://dx.doi.org/10.1007/1-84628-352-3</a><br/>Format:&#160;Electronic Resources<br/> Interoperability of Enterprise Software and Applications ent://SD_ILS/0/SD_ILS:508406 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Konstantas, Dimitri. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-152-0">http://dx.doi.org/10.1007/1-84628-152-0</a><br/>Format:&#160;Electronic Resources<br/> Rationale Management in Software Engineering ent://SD_ILS/0/SD_ILS:509838 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Dutoit, Allen H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-30998-7">http://dx.doi.org/10.1007/978-3-540-30998-7</a><br/>Format:&#160;Electronic Resources<br/> Essential Software Architecture ent://SD_ILS/0/SD_ILS:509482 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Gorton, Ian. author.<br/><a href="http://dx.doi.org/10.1007/3-540-28714-0">http://dx.doi.org/10.1007/3-540-28714-0</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 5th International Conference, EGOV 2006, Krak&oacute;w, Poland, September 4-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511544 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/11823100">http://dx.doi.org/10.1007/11823100</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - EUROCRYPT 2006 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511160 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/11761679">http://dx.doi.org/10.1007/11761679</a><br/>Format:&#160;Electronic Resources<br/> Reuse of Off-the-Shelf Components 9th International Conference on Software Reuse, ICSR 2006 Turin, Italy, June 12-15, 2006 Proceedings ent://SD_ILS/0/SD_ILS:511173 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Morisio, Maurizio. editor.<br/><a href="http://dx.doi.org/10.1007/11763864">http://dx.doi.org/10.1007/11763864</a><br/>Format:&#160;Electronic Resources<br/> Software Process Change International Software Process Workshop and International Workshop on Software Process Simulation and Modeling, SPW/ProSim 2006, Shanghai, China, May 20-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511071 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Wang, Qing. editor.<br/><a href="http://dx.doi.org/10.1007/11754305">http://dx.doi.org/10.1007/11754305</a><br/>Format:&#160;Electronic Resources<br/> Trust and Privacy in Digital Business Third International Conference, TrustBus 2006, Krak&oacute;w, Poland, September 4-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511566 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Fischer-H&uuml;bner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/11824633">http://dx.doi.org/10.1007/11824633</a><br/>Format:&#160;Electronic Resources<br/> Product-Focused Software Process Improvement 7th International Conference, PROFES 2006, Amsterdam, The Netherlands, June 12-14, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511194 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;M&uuml;nch, J&uuml;rgen. editor.<br/><a href="http://dx.doi.org/10.1007/11767718">http://dx.doi.org/10.1007/11767718</a><br/>Format:&#160;Electronic Resources<br/> Trust Management 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511090 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;St&oslash;len, Ketil. editor.<br/><a href="http://dx.doi.org/10.1007/11755593">http://dx.doi.org/10.1007/11755593</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - CRYPTO 2006 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511499 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Dwork, Cynthia. editor.<br/><a href="http://dx.doi.org/10.1007/11818175">http://dx.doi.org/10.1007/11818175</a><br/>Format:&#160;Electronic Resources<br/> Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511771 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Breveglieri, Luca. editor.<br/><a href="http://dx.doi.org/10.1007/11889700">http://dx.doi.org/10.1007/11889700</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:511773 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Crescenzo, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/11889663">http://dx.doi.org/10.1007/11889663</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511961 2024-05-20T08:27:25Z 2024-05-20T08:27:25Z by&#160;Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/11935070">http://dx.doi.org/10.1007/11935070</a><br/>Format:&#160;Electronic Resources<br/>