Search Results for - Narrowed by: Management of Computing and Information Systems.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026ps$003d300$0026isd$003dtrue?2024-05-30T17:22:35ZGraphics Recognition. Current Trends and Evolutions 12th IAPR International Workshop, GREC 2017, Kyoto, Japan, November 9-10, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20853012024-05-30T17:22:35Z2024-05-30T17:22:35Zby Fornés, Alicia. editor. (orcid)0000-0002-9692-5336<br/><a href="https://doi.org/10.1007/978-3-030-02284-6">https://doi.org/10.1007/978-3-030-02284-6</a><br/>Format: Electronic Resources<br/>Enterprise Modeling Facilitating the Process and the Peopleent://SD_ILS/0/SD_ILS:20843422024-05-30T17:22:35Z2024-05-30T17:22:35Zby Stirna, Janis. author. (orcid)0000-0002-3669-832X<br/><a href="https://doi.org/10.1007/978-3-319-94857-7">https://doi.org/10.1007/978-3-319-94857-7</a><br/>Format: Electronic Resources<br/>Agile Processes in Software Engineering and Extreme Programming 19th International Conference, XP 2018, Porto, Portugal, May 21–25, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20844832024-05-30T17:22:35Z2024-05-30T17:22:35Zby Garbajosa, Juan. editor. (orcid)0000-0003-0161-3485<br/><a href="https://doi.org/10.1007/978-3-319-91602-6">https://doi.org/10.1007/978-3-319-91602-6</a><br/>Format: Electronic Resources<br/>Cybersecurity in China The Next Waveent://SD_ILS/0/SD_ILS:20841182024-05-30T17:22:35Z2024-05-30T17:22:35Zby Austin, Greg. author.<br/><a href="https://doi.org/10.1007/978-3-319-68436-9">https://doi.org/10.1007/978-3-319-68436-9</a><br/>Format: Electronic Resources<br/>Thinking-Driven Testing The Most Reasonable Approach to Quality Controlent://SD_ILS/0/SD_ILS:20846962024-05-30T17:22:35Z2024-05-30T17:22:35Zby Roman, Adam. author.<br/><a href="https://doi.org/10.1007/978-3-319-73195-7">https://doi.org/10.1007/978-3-319-73195-7</a><br/>Format: Electronic Resources<br/>Fog Computing Concepts, Frameworks and Technologiesent://SD_ILS/0/SD_ILS:20849832024-05-30T17:22:35Z2024-05-30T17:22:35Zby Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94890-4">https://doi.org/10.1007/978-3-319-94890-4</a><br/>Format: Electronic Resources<br/>Handbook of Mobile Data Privacyent://SD_ILS/0/SD_ILS:20843032024-05-30T17:22:35Z2024-05-30T17:22:35Zby Gkoulalas-Divanis, Aris. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format: Electronic Resources<br/>Transforming the IT Services Lifecycle with AI Technologiesent://SD_ILS/0/SD_ILS:20843102024-05-30T17:22:35Z2024-05-30T17:22:35Zby Kloeckner, Kristof. author.<br/><a href="https://doi.org/10.1007/978-3-319-94048-9">https://doi.org/10.1007/978-3-319-94048-9</a><br/>Format: Electronic Resources<br/>Product Lifecycle Management to Support Industry 4.0 15th IFIP WG 5.1 International Conference, PLM 2018, Turin, Italy, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20843532024-05-30T17:22:35Z2024-05-30T17:22:35Zby Chiabert, Paolo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01614-2">https://doi.org/10.1007/978-3-030-01614-2</a><br/>Format: Electronic Resources<br/>Data Privacy Gamesent://SD_ILS/0/SD_ILS:20845012024-05-30T17:22:35Z2024-05-30T17:22:35Zby Xu, Lei. author.<br/><a href="https://doi.org/10.1007/978-3-319-77965-2">https://doi.org/10.1007/978-3-319-77965-2</a><br/>Format: Electronic Resources<br/>Software Business 9th International Conference, ICSOB 2018, Tallinn, Estonia, June 11–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20843512024-05-30T17:22:35Z2024-05-30T17:22:35Zby Wnuk, Krzysztof. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04840-2">https://doi.org/10.1007/978-3-030-04840-2</a><br/>Format: Electronic Resources<br/>Nordic Contributions in IS Research 9th Scandinavian Conference on Information Systems, SCIS 2018, Odder, Denmark, August 5–8, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20849292024-05-30T17:22:35Z2024-05-30T17:22:35Zby Müller, Sune Dueholm. editor. (orcid)0000-0003-3194-0233<br/><a href="https://doi.org/10.1007/978-3-319-96367-9">https://doi.org/10.1007/978-3-319-96367-9</a><br/>Format: Electronic Resources<br/>The Agile Safety Caseent://SD_ILS/0/SD_ILS:20849612024-05-30T17:22:35Z2024-05-30T17:22:35Zby Myklebust, Thor. author.<br/><a href="https://doi.org/10.1007/978-3-319-70265-0">https://doi.org/10.1007/978-3-319-70265-0</a><br/>Format: Electronic Resources<br/>Health Informatics on FHIR: How HL7's New API is Transforming Healthcareent://SD_ILS/0/SD_ILS:20842472024-05-30T17:22:35Z2024-05-30T17:22:35Zby Braunstein, Mark L. author.<br/><a href="https://doi.org/10.1007/978-3-319-93414-3">https://doi.org/10.1007/978-3-319-93414-3</a><br/>Format: Electronic Resources<br/>Applications and Usability of Interactive Television 6th Iberoamerican Conference, jAUTI 2017, Aveiro, Portugal, October 12-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844622024-05-30T17:22:35Z2024-05-30T17:22:35Zby Abásolo, María José. editor.<br/><a href="https://doi.org/10.1007/978-3-319-90170-1">https://doi.org/10.1007/978-3-319-90170-1</a><br/>Format: Electronic Resources<br/>IT Management The art of managing IT based on a solid framework leveraging the company´s political ecosystement://SD_ILS/0/SD_ILS:20846622024-05-30T17:22:35Z2024-05-30T17:22:35Zby Pilorget, Lionel. author.<br/><a href="https://doi.org/10.1007/978-3-658-19309-6">https://doi.org/10.1007/978-3-658-19309-6</a><br/>Format: Electronic Resources<br/>The Essence of Software Engineeringent://SD_ILS/0/SD_ILS:20846632024-05-30T17:22:35Z2024-05-30T17:22:35Zby Gruhn, Volker. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73897-0">https://doi.org/10.1007/978-3-319-73897-0</a><br/>Format: Electronic Resources<br/>Collaborative Networks of Cognitive Systems 19th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2018, Cardiff, UK, September 17-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842582024-05-30T17:22:35Z2024-05-30T17:22:35Zby Camarinha-Matos, Luis M. editor. (orcid)0000-0003-0594-1961<br/><a href="https://doi.org/10.1007/978-3-319-99127-6">https://doi.org/10.1007/978-3-319-99127-6</a><br/>Format: Electronic Resources<br/>SafeScrum® – Agile Development of Safety-Critical Softwareent://SD_ILS/0/SD_ILS:20842732024-05-30T17:22:35Z2024-05-30T17:22:35Zby Hanssen, Geir Kjetil. author.<br/><a href="https://doi.org/10.1007/978-3-319-99334-8">https://doi.org/10.1007/978-3-319-99334-8</a><br/>Format: Electronic Resources<br/>Smart Cities Development and Governance Frameworksent://SD_ILS/0/SD_ILS:20844502024-05-30T17:22:35Z2024-05-30T17:22:35Zby Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76669-0">https://doi.org/10.1007/978-3-319-76669-0</a><br/>Format: Electronic Resources<br/>Semantic Applications Methodology, Technology, Corporate Useent://SD_ILS/0/SD_ILS:20844512024-05-30T17:22:35Z2024-05-30T17:22:35Zby Hoppe, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-55433-3">https://doi.org/10.1007/978-3-662-55433-3</a><br/>Format: Electronic Resources<br/>Software Quality: Methods and Tools for Better Software and Systems 10th International Conference, SWQD 2018, Vienna, Austria, January 16–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20845722024-05-30T17:22:35Z2024-05-30T17:22:35Zby Winkler, Dietmar. editor. (orcid)0000-0002-4743-3124<br/><a href="https://doi.org/10.1007/978-3-319-71440-0">https://doi.org/10.1007/978-3-319-71440-0</a><br/>Format: Electronic Resources<br/>Automated Invention for Smart Industries 18th International TRIZ Future Conference, TFC 2018, Strasbourg, France, October 29–31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20841812024-05-30T17:22:35Z2024-05-30T17:22:35Zby Cavallucci, Denis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02456-7">https://doi.org/10.1007/978-3-030-02456-7</a><br/>Format: Electronic Resources<br/>Agile Methods 8th Brazilian Workshop, WBMA 2017, Belém, Brazil, September 13–14, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20841852024-05-30T17:22:35Z2024-05-30T17:22:35Zby Santos, Viviane Almeida dos. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73673-0">https://doi.org/10.1007/978-3-319-73673-0</a><br/>Format: Electronic Resources<br/>Align Client and Provider Perspectives Best Practices in IT Outsourcingent://SD_ILS/0/SD_ILS:20841892024-05-30T17:22:35Z2024-05-30T17:22:35Zby Haas, Lionel. author.<br/><a href="https://doi.org/10.1007/978-3-319-92064-1">https://doi.org/10.1007/978-3-319-92064-1</a><br/>Format: Electronic Resources<br/>Combinatorial Image Analysis 19th International Workshop, IWCIA 2018, Porto, Portugal, November 22–24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852812024-05-30T17:22:35Z2024-05-30T17:22:35Zby Barneva, Reneta P. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05288-1">https://doi.org/10.1007/978-3-030-05288-1</a><br/>Format: Electronic Resources<br/>Systems, Software and Services Process Improvement 25th European Conference, EuroSPI 2018, Bilbao, Spain, September 5-7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842112024-05-30T17:22:35Z2024-05-30T17:22:35Zby Larrucea, Xabier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97925-0">https://doi.org/10.1007/978-3-319-97925-0</a><br/>Format: Electronic Resources<br/>Project Management at the Edge of Chaos Social Techniques for Complex Systemsent://SD_ILS/0/SD_ILS:20846982024-05-30T17:22:35Z2024-05-30T17:22:35Zby Oswald, Alfred. author.<br/><a href="https://doi.org/10.1007/978-3-662-48261-2">https://doi.org/10.1007/978-3-662-48261-2</a><br/>Format: Electronic Resources<br/>Software Processes and Life Cycle Models An Introduction to Modelling, Using and Managing Agile, Plan-Driven and Hybrid Processesent://SD_ILS/0/SD_ILS:20842212024-05-30T17:22:35Z2024-05-30T17:22:35Zby Kneuper, Ralf. author.<br/><a href="https://doi.org/10.1007/978-3-319-98845-0">https://doi.org/10.1007/978-3-319-98845-0</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852902024-05-30T17:22:35Z2024-05-30T17:22:35Zby Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format: Electronic Resources<br/>A Knowledge Representation Practionary Guidelines Based on Charles Sanders Peirceent://SD_ILS/0/SD_ILS:20843832024-05-30T17:22:35Z2024-05-30T17:22:35Zby Bergman, Michael K. author.<br/><a href="https://doi.org/10.1007/978-3-319-98092-8">https://doi.org/10.1007/978-3-319-98092-8</a><br/>Format: Electronic Resources<br/>Towards Extensible and Adaptable Methods in Computingent://SD_ILS/0/SD_ILS:20844102024-05-30T17:22:35Z2024-05-30T17:22:35Zby Chakraverty, Shampa. editor.<br/><a href="https://doi.org/10.1007/978-981-13-2348-5">https://doi.org/10.1007/978-981-13-2348-5</a><br/>Format: Electronic Resources<br/>Advanced Computing Strategies for Engineering 25th EG-ICE International Workshop 2018, Lausanne, Switzerland, June 10-13, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20851172024-05-30T17:22:35Z2024-05-30T17:22:35Zby Smith, Ian F. C. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91638-5">https://doi.org/10.1007/978-3-319-91638-5</a><br/>Format: Electronic Resources<br/>Sailing Routes in the World of Computation 14th Conference on Computability in Europe, CiE 2018, Kiel, Germany, July 30 – August 3, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851242024-05-30T17:22:35Z2024-05-30T17:22:35Zby Manea, Florin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94418-0">https://doi.org/10.1007/978-3-319-94418-0</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855232024-05-30T17:22:35Z2024-05-30T17:22:35Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Cyber Security: Power and Technologyent://SD_ILS/0/SD_ILS:20869802024-05-30T17:22:35Z2024-05-30T17:22:35Zby Lehto, Martti. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format: Electronic Resources<br/>Information Technology - New Generations 14th International Conference on Information Technologyent://SD_ILS/0/SD_ILS:20875522024-05-30T17:22:35Z2024-05-30T17:22:35Zby Latifi, Shahram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54978-1">https://doi.org/10.1007/978-3-319-54978-1</a><br/>Format: Electronic Resources<br/>Computer and Information Scienceent://SD_ILS/0/SD_ILS:20882152024-05-30T17:22:35Z2024-05-30T17:22:35Zby Lee, Roger. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60170-0">https://doi.org/10.1007/978-3-319-60170-0</a><br/>Format: Electronic Resources<br/>Proceedings of the Eleventh International Conference on Management Science and Engineering Managementent://SD_ILS/0/SD_ILS:20882812024-05-30T17:22:35Z2024-05-30T17:22:35Zby Xu, Jiuping. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59280-0">https://doi.org/10.1007/978-3-319-59280-0</a><br/>Format: Electronic Resources<br/>Crowdsourcing of Sensor Cloud Servicesent://SD_ILS/0/SD_ILS:20847192024-05-30T17:22:35Z2024-05-30T17:22:35Zby Ghari Neiat, Azadeh. author.<br/><a href="https://doi.org/10.1007/978-3-319-91536-4">https://doi.org/10.1007/978-3-319-91536-4</a><br/>Format: Electronic Resources<br/>Information Literacy in the Workplace 5th European Conference, ECIL 2017, Saint Malo, France, September 18-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847982024-05-30T17:22:35Z2024-05-30T17:22:35Zby Kurbanoğlu, Serap. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74334-9">https://doi.org/10.1007/978-3-319-74334-9</a><br/>Format: Electronic Resources<br/>Bidirectional Transformations International Summer School, Oxford, UK, July 25-29, 2016, Tutorial Lecturesent://SD_ILS/0/SD_ILS:20856412024-05-30T17:22:35Z2024-05-30T17:22:35Zby Gibbons, Jeremy. editor. (orcid)0000-0002-8426-9917<br/><a href="https://doi.org/10.1007/978-3-319-79108-1">https://doi.org/10.1007/978-3-319-79108-1</a><br/>Format: Electronic Resources<br/>System Analysis and Modeling. Languages, Methods, and Tools for Systems Engineering 10th International Conference, SAM 2018, Copenhagen, Denmark, October 15–16, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854082024-05-30T17:22:35Z2024-05-30T17:22:35Zby Khendek, Ferhat. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01042-3">https://doi.org/10.1007/978-3-030-01042-3</a><br/>Format: Electronic Resources<br/>Economic Models for Managing Cloud Servicesent://SD_ILS/0/SD_ILS:20848992024-05-30T17:22:35Z2024-05-30T17:22:35Zby Mistry, Sajib. author.<br/><a href="https://doi.org/10.1007/978-3-319-73876-5">https://doi.org/10.1007/978-3-319-73876-5</a><br/>Format: Electronic Resources<br/>The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?ent://SD_ILS/0/SD_ILS:20849012024-05-30T17:22:35Z2024-05-30T17:22:35Zby Lysne, Olav. author.<br/><a href="https://doi.org/10.1007/978-3-319-74950-1">https://doi.org/10.1007/978-3-319-74950-1</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2018 The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855792024-05-30T17:22:35Z2024-05-30T17:22:35Zby Smart, Nigel P. editor. (orcid)0000-0003-3567-3304<br/><a href="https://doi.org/10.1007/978-3-319-76953-0">https://doi.org/10.1007/978-3-319-76953-0</a><br/>Format: Electronic Resources<br/>Advanced Computing Strategies for Engineering 25th EG-ICE International Workshop 2018, Lausanne, Switzerland, June 10-13, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860372024-05-30T17:22:35Z2024-05-30T17:22:35Zby Smith, Ian F. C. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91635-4">https://doi.org/10.1007/978-3-319-91635-4</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20847972024-05-30T17:22:35Z2024-05-30T17:22:35Zby Matoušek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Software Development Measurement Programs Development, Management and Evolutionent://SD_ILS/0/SD_ILS:20849912024-05-30T17:22:35Z2024-05-30T17:22:35Zby Staron, Miroslaw. author.<br/><a href="https://doi.org/10.1007/978-3-319-91836-5">https://doi.org/10.1007/978-3-319-91836-5</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20855382024-05-30T17:22:35Z2024-05-30T17:22:35Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Software Process Improvement and Capability Determination 18th International Conference, SPICE 2018, Thessaloniki, Greece, October 9–10, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20843292024-05-30T17:22:35Z2024-05-30T17:22:35Zby Stamelos, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00623-5">https://doi.org/10.1007/978-3-030-00623-5</a><br/>Format: Electronic Resources<br/>Introducing ethereum and solidity : foundations of cryptocurrency and blockchain programming for beginnersent://SD_ILS/0/SD_ILS:23128782024-05-30T17:22:35Z2024-05-30T17:22:35Zby Dannen, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484225356/?ar">https://learning.oreilly.com/library/view/~/9781484225356/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484225356/?ar">https://go.oreilly.com/library-access/library/view/-/9781484225356/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484225356">https://learning.oreilly.com/library/view/~/9781484225356</a><br/>Format: Electronic Resources<br/>Pragmatic Evaluation of Software Architecturesent://SD_ILS/0/SD_ILS:20847612024-05-30T17:22:35Z2024-05-30T17:22:35Zby Knodel, Jens. author.<br/><a href="https://doi.org/10.1007/978-3-319-34177-4">https://doi.org/10.1007/978-3-319-34177-4</a><br/>Format: Electronic Resources<br/>Product Lifecycle Management for Digital Transformation of Industries 13th IFIP WG 5.1 International Conference, PLM 2016, Columbia, SC, USA, July 11-13, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20841082024-05-30T17:22:35Z2024-05-30T17:22:35Zby Harik, Ramy. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54660-5">https://doi.org/10.1007/978-3-319-54660-5</a><br/>Format: Electronic Resources<br/>Software Process Improvement and Capability Determination 16th International Conference, SPICE 2016, Dublin, Ireland, June 9-10, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20846742024-05-30T17:22:35Z2024-05-30T17:22:35Zby Clarke, Paul M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-38980-6">https://doi.org/10.1007/978-3-319-38980-6</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841052024-05-30T17:22:35Z2024-05-30T17:22:35Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format: Electronic Resources<br/>Software Technologies 10th International Joint Conference, ICSOFT 2015, Colmar, France, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849412024-05-30T17:22:35Z2024-05-30T17:22:35Zby Lorenz, Pascal. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30142-6">https://doi.org/10.1007/978-3-319-30142-6</a><br/>Format: Electronic Resources<br/>Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850362024-05-30T17:22:35Z2024-05-30T17:22:35Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format: Electronic Resources<br/>Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847772024-05-30T17:22:35Z2024-05-30T17:22:35Zby Haltinner, Kristin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28313-5">https://doi.org/10.1007/978-3-319-28313-5</a><br/>Format: Electronic Resources<br/>Co-production in the Public Sector Experiences and Challengesent://SD_ILS/0/SD_ILS:20846942024-05-30T17:22:35Z2024-05-30T17:22:35Zby Fugini, Mariagrazia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30558-5">https://doi.org/10.1007/978-3-319-30558-5</a><br/>Format: Electronic Resources<br/>Managing Information Technologyent://SD_ILS/0/SD_ILS:20840892024-05-30T17:22:35Z2024-05-30T17:22:35Zby Castillo, Francisco. author.<br/><a href="https://doi.org/10.1007/978-3-319-38891-5">https://doi.org/10.1007/978-3-319-38891-5</a><br/>Format: Electronic Resources<br/>Agile Processes, in Software Engineering, and Extreme Programming 17th International Conference, XP 2016, Edinburgh, UK, May 24-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20846022024-05-30T17:22:35Z2024-05-30T17:22:35Zby Sharp, Helen. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33515-5">https://doi.org/10.1007/978-3-319-33515-5</a><br/>Format: Electronic Resources<br/>Formal SQL Tuning for Oracle Databases Practical Efficiency - Efficient Practiceent://SD_ILS/0/SD_ILS:20843652024-05-30T17:22:35Z2024-05-30T17:22:35Zby Nossov, Leonid. author.<br/><a href="https://doi.org/10.1007/978-3-662-50417-8">https://doi.org/10.1007/978-3-662-50417-8</a><br/>Format: Electronic Resources<br/>Evaluation of Novel Approaches to Software Engineering 11th International Conference, ENASE 2016, Rome, Italy, April 27–28, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20843672024-05-30T17:22:35Z2024-05-30T17:22:35Zby Maciaszek, Leszek A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56390-9">https://doi.org/10.1007/978-3-319-56390-9</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847162024-05-30T17:22:35Z2024-05-30T17:22:35Zby Aspinall, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41763-9">https://doi.org/10.1007/978-3-319-41763-9</a><br/>Format: Electronic Resources<br/>Advanced Multimedia and Ubiquitous Engineering FutureTech & MUEent://SD_ILS/0/SD_ILS:20840362024-05-30T17:22:35Z2024-05-30T17:22:35Zby Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-981-10-1536-6">https://doi.org/10.1007/978-981-10-1536-6</a><br/>Format: Electronic Resources<br/>Software Quality. The Future of Systems- and Software Development 8th International Conference, SWQD 2016, Vienna, Austria, January 18-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20844382024-05-30T17:22:35Z2024-05-30T17:22:35Zby Winkler, Dietmar. editor.<br/><a href="https://doi.org/10.1007/978-3-319-27033-3">https://doi.org/10.1007/978-3-319-27033-3</a><br/>Format: Electronic Resources<br/>Tamed Agility Pragmatic Contracting and Collaboration in Agile Software Projectsent://SD_ILS/0/SD_ILS:20847682024-05-30T17:22:35Z2024-05-30T17:22:35Zby Book, Matthias. author.<br/><a href="https://doi.org/10.1007/978-3-319-41478-2">https://doi.org/10.1007/978-3-319-41478-2</a><br/>Format: Electronic Resources<br/>Guide to Software Development Designing and Managing the Life Cycleent://SD_ILS/0/SD_ILS:20847702024-05-30T17:22:35Z2024-05-30T17:22:35Zby Langer, Arthur M. author.<br/><a href="https://doi.org/10.1007/978-1-4471-6799-0">https://doi.org/10.1007/978-1-4471-6799-0</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842542024-05-30T17:22:35Z2024-05-30T17:22:35Zby Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20852302024-05-30T17:22:35Z2024-05-30T17:22:35Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40367-0">https://doi.org/10.1007/978-3-319-40367-0</a><br/>Format: Electronic Resources<br/>Social, Cultural, and Behavioral Modeling 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28 - July 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852312024-05-30T17:22:35Z2024-05-30T17:22:35Zby Xu, Kevin S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39931-7">https://doi.org/10.1007/978-3-319-39931-7</a><br/>Format: Electronic Resources<br/>Software Architecture 10th European Conference, ECSA 2016, Copenhagen, Denmark, November 28 -- December 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852602024-05-30T17:22:35Z2024-05-30T17:22:35Zby Tekinerdogan, Bedir. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48992-6">https://doi.org/10.1007/978-3-319-48992-6</a><br/>Format: Electronic Resources<br/>Product-Focused Software Process Improvement 17th International Conference, PROFES 2016, Trondheim, Norway, November 22-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852622024-05-30T17:22:35Z2024-05-30T17:22:35Zby Abrahamsson, Pekka. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49094-6">https://doi.org/10.1007/978-3-319-49094-6</a><br/>Format: Electronic Resources<br/>Cloud Computing and Services Science 5th International Conference, CLOSER 2015, Lisbon, Portugal, May 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20845542024-05-30T17:22:35Z2024-05-30T17:22:35Zby Helfert, Markus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29582-4">https://doi.org/10.1007/978-3-319-29582-4</a><br/>Format: Electronic Resources<br/>Advances in Computing Applicationsent://SD_ILS/0/SD_ILS:20844742024-05-30T17:22:35Z2024-05-30T17:22:35Zby Chakrabarti, Amlan. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2630-0">https://doi.org/10.1007/978-981-10-2630-0</a><br/>Format: Electronic Resources<br/>Product Lifecycle Management in the Era of Internet of Things 12th IFIP WG 5.1 International Conference, PLM 2015, Doha, Qatar, October 19-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20841742024-05-30T17:22:35Z2024-05-30T17:22:35Zby Bouras, Abdelaziz. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33111-9">https://doi.org/10.1007/978-3-319-33111-9</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:20852462024-05-30T17:22:35Z2024-05-30T17:22:35Zby Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48671-0">https://doi.org/10.1007/978-3-319-48671-0</a><br/>Format: Electronic Resources<br/>Modeling with UML Language, Concepts, Methodsent://SD_ILS/0/SD_ILS:20847412024-05-30T17:22:35Z2024-05-30T17:22:35Zby Rumpe, Bernhard. author.<br/><a href="https://doi.org/10.1007/978-3-319-33933-7">https://doi.org/10.1007/978-3-319-33933-7</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852382024-05-30T17:22:35Z2024-05-30T17:22:35Zby Franz, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45572-3">https://doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852562024-05-30T17:22:35Z2024-05-30T17:22:35Zby Gierlichs, Benedikt. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53140-2">https://doi.org/10.1007/978-3-662-53140-2</a><br/>Format: Electronic Resources<br/>Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:20857282024-05-30T17:22:35Z2024-05-30T17:22:35Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29883-2">https://doi.org/10.1007/978-3-319-29883-2</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857292024-05-30T17:22:35Z2024-05-30T17:22:35Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Transactions on Modularity and Composition Ient://SD_ILS/0/SD_ILS:20858312024-05-30T17:22:35Z2024-05-30T17:22:35Zby Chiba, Shigeru. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46969-0">https://doi.org/10.1007/978-3-319-46969-0</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850152024-05-30T17:22:35Z2024-05-30T17:22:35Zby Caballero, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40667-1">https://doi.org/10.1007/978-3-319-40667-1</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850162024-05-30T17:22:35Z2024-05-30T17:22:35Zby Peyrin, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-52993-5">https://doi.org/10.1007/978-3-662-52993-5</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20858402024-05-30T17:22:35Z2024-05-30T17:22:35Zby Yang, Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-42836-9">https://doi.org/10.1007/978-3-319-42836-9</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850972024-05-30T17:22:35Z2024-05-30T17:22:35Zby Rome, Erich. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33331-1">https://doi.org/10.1007/978-3-319-33331-1</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20856852024-05-30T17:22:35Z2024-05-30T17:22:35Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40253-6">https://doi.org/10.1007/978-3-319-40253-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20858002024-05-30T17:22:35Z2024-05-30T17:22:35Zby Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53890-6">https://doi.org/10.1007/978-3-662-53890-6</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858022024-05-30T17:22:35Z2024-05-30T17:22:35Zby Zikas, Vassilis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44618-9">https://doi.org/10.1007/978-3-319-44618-9</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861432024-05-30T17:22:35Z2024-05-30T17:22:35Zby Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861442024-05-30T17:22:35Z2024-05-30T17:22:35Zby Bao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49151-6">https://doi.org/10.1007/978-3-319-49151-6</a><br/>Format: Electronic Resources<br/>Modelling Foundations and Applications 12th European Conference, ECMFA 2016, Held as Part of STAF 2016, Vienna, Austria, July 6-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858202024-05-30T17:22:35Z2024-05-30T17:22:35Zby Wąsowski, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-319-42061-5">https://doi.org/10.1007/978-3-319-42061-5</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860062024-05-30T17:22:35Z2024-05-30T17:22:35Zby Bonakdarpour, Borzoo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49259-9">https://doi.org/10.1007/978-3-319-49259-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860592024-05-30T17:22:35Z2024-05-30T17:22:35Zby Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53887-6">https://doi.org/10.1007/978-3-662-53887-6</a><br/>Format: Electronic Resources<br/>Model and Data Engineering 6th International Conference, MEDI 2016, Almería, Spain, September 21-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856142024-05-30T17:22:35Z2024-05-30T17:22:35Zby Bellatreche, Ladjel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45547-1">https://doi.org/10.1007/978-3-319-45547-1</a><br/>Format: Electronic Resources<br/>Formal Methods: Foundations and Applications 19th Brazilian Symposium, SBMF 2016, Natal, Brazil, November 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856182024-05-30T17:22:35Z2024-05-30T17:22:35Zby Ribeiro, Leila. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49815-7">https://doi.org/10.1007/978-3-319-49815-7</a><br/>Format: Electronic Resources<br/>Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papersent://SD_ILS/0/SD_ILS:20860622024-05-30T17:22:35Z2024-05-30T17:22:35Zby Bécue, Adrien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40385-4">https://doi.org/10.1007/978-3-319-40385-4</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20860632024-05-30T17:22:35Z2024-05-30T17:22:35Zby Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860662024-05-30T17:22:35Z2024-05-30T17:22:35Zby Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48057-2">https://doi.org/10.1007/978-3-319-48057-2</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20860792024-05-30T17:22:35Z2024-05-30T17:22:35Zby Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854062024-05-30T17:22:35Z2024-05-30T17:22:35Zby Lambrinoudakis, Costas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31811-0">https://doi.org/10.1007/978-3-319-31811-0</a><br/>Format: Electronic Resources<br/>Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20–22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859532024-05-30T17:22:35Z2024-05-30T17:22:35Zby Kim, Ho-won. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31875-2">https://doi.org/10.1007/978-3-319-31875-2</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859802024-05-30T17:22:35Z2024-05-30T17:22:35Zby Katsikas, Sokratis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44341-6">https://doi.org/10.1007/978-3-319-44341-6</a><br/>Format: Electronic Resources<br/>Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859862024-05-30T17:22:35Z2024-05-30T17:22:35Zby Badonnel, Rémi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39814-3">https://doi.org/10.1007/978-3-319-39814-3</a><br/>Format: Electronic Resources<br/>Mathematical and Engineering Methods in Computer Science 10th International Doctoral Workshop, MEMICS 2015, Telč, Czech Republic, October 23–25, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20855252024-05-30T17:22:35Z2024-05-30T17:22:35Zby Kofroň, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29817-7">https://doi.org/10.1007/978-3-319-29817-7</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:20855262024-05-30T17:22:35Z2024-05-30T17:22:35Zby Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>Mobility Management Principle, Technology and Applicationsent://SD_ILS/0/SD_ILS:20865652024-05-30T17:22:35Z2024-05-30T17:22:35Zby Chen, Shanzhi. author.<br/><a href="https://doi.org/10.1007/978-3-662-52726-9">https://doi.org/10.1007/978-3-662-52726-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860992024-05-30T17:22:35Z2024-05-30T17:22:35Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53018-4">https://doi.org/10.1007/978-3-662-53018-4</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861862024-05-30T17:22:35Z2024-05-30T17:22:35Zby Clark, Jeremy. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53357-4">https://doi.org/10.1007/978-3-662-53357-4</a><br/>Format: Electronic Resources<br/>Social Media: The Good, the Bad, and the Ugly 15th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2016, Swansea, UK, September 13–15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20851962024-05-30T17:22:35Z2024-05-30T17:22:35Zby Dwivedi, Yogesh K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45234-0">https://doi.org/10.1007/978-3-319-45234-0</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing – ICSOC 2015 Workshops WESOA, RMSOC, ISC, DISCO, WESE, BSCI, FOR-MOVES, Goa, India, November 16-19, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20858682024-05-30T17:22:35Z2024-05-30T17:22:35Zby Norta, Alex. editor.<br/><a href="https://doi.org/10.1007/978-3-662-50539-7">https://doi.org/10.1007/978-3-662-50539-7</a><br/>Format: Electronic Resources<br/>Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858882024-05-30T17:22:35Z2024-05-30T17:22:35Zby Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format: Electronic Resources<br/>Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861262024-05-30T17:22:35Z2024-05-30T17:22:35Zby Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858872024-05-30T17:22:35Z2024-05-30T17:22:35Zby Ogawa, Kazuto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860952024-05-30T17:22:35Z2024-05-30T17:22:35Zby Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format: Electronic Resources<br/>Logistics and Supply Chain Innovation Bridging the Gap between Theory and Practiceent://SD_ILS/0/SD_ILS:20866922024-05-30T17:22:35Z2024-05-30T17:22:35Zby Zijm, Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-22288-2">https://doi.org/10.1007/978-3-319-22288-2</a><br/>Format: Electronic Resources<br/>Transactions on Foundations for Mastering Change Ient://SD_ILS/0/SD_ILS:20861172024-05-30T17:22:35Z2024-05-30T17:22:35Zby Steffen, Bernhard. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46508-1">https://doi.org/10.1007/978-3-319-46508-1</a><br/>Format: Electronic Resources<br/>Electronic Government and the Information Systems Perspective 5th International Conference, EGOVIS 2016, Porto, Portugal, September 5-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20862082024-05-30T17:22:35Z2024-05-30T17:22:35Zby Kő, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44159-7">https://doi.org/10.1007/978-3-319-44159-7</a><br/>Format: Electronic Resources<br/>Computer and Information Scienceent://SD_ILS/0/SD_ILS:20873062024-05-30T17:22:35Z2024-05-30T17:22:35Zby Lee, Roger. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40171-3">https://doi.org/10.1007/978-3-319-40171-3</a><br/>Format: Electronic Resources<br/>Evaluation of Novel Approaches to Software Engineering 10th International Conference, ENASE 2015, Barcelona, Spain, April 29–30, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844142024-05-30T17:22:35Z2024-05-30T17:22:35Zby Maciaszek, Leszek A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30243-0">https://doi.org/10.1007/978-3-319-30243-0</a><br/>Format: Electronic Resources<br/>Provable Security 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854302024-05-30T17:22:35Z2024-05-30T17:22:35Zby Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47422-9">https://doi.org/10.1007/978-3-319-47422-9</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20856762024-05-30T17:22:35Z2024-05-30T17:22:35Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854652024-05-30T17:22:35Z2024-05-30T17:22:35Zby Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45931-8">https://doi.org/10.1007/978-3-319-45931-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855852024-05-30T17:22:35Z2024-05-30T17:22:35Zby Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49896-5">https://doi.org/10.1007/978-3-662-49896-5</a><br/>Format: Electronic Resources<br/>Software Engineering for Resilient Systems 8th International Workshop, SERENE 2016, Gothenburg, Sweden, September 5-6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858982024-05-30T17:22:35Z2024-05-30T17:22:35Zby Crnkovic, Ivica. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45892-2">https://doi.org/10.1007/978-3-319-45892-2</a><br/>Format: Electronic Resources<br/>Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856982024-05-30T17:22:35Z2024-05-30T17:22:35Zby Lam, Kwok-Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50011-9">https://doi.org/10.1007/978-3-319-50011-9</a><br/>Format: Electronic Resources<br/>Requirements Engineering: Foundation for Software Quality 22nd International Working Conference, REFSQ 2016, Gothenburg, Sweden, March 14-17, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857012024-05-30T17:22:35Z2024-05-30T17:22:35Zby Daneva, Maya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30282-9">https://doi.org/10.1007/978-3-319-30282-9</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20857042024-05-30T17:22:35Z2024-05-30T17:22:35Zby Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49384-7">https://doi.org/10.1007/978-3-662-49384-7</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857092024-05-30T17:22:35Z2024-05-30T17:22:35Zby Pointcheval, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31517-1">https://doi.org/10.1007/978-3-319-31517-1</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857132024-05-30T17:22:35Z2024-05-30T17:22:35Zby Standaert, François-Xavier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43283-0">https://doi.org/10.1007/978-3-319-43283-0</a><br/>Format: Electronic Resources<br/>Transactions on Computational Collective Intelligence XXVent://SD_ILS/0/SD_ILS:20857182024-05-30T17:22:35Z2024-05-30T17:22:35Zby Nguyen, Ngoc Thanh. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53580-6">https://doi.org/10.1007/978-3-662-53580-6</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data and Processes 6th International Provenance and Annotation Workshop, IPAW 2016, McLean, VA, USA, June 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859962024-05-30T17:22:35Z2024-05-30T17:22:35Zby Mattoso, Marta. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40593-3">https://doi.org/10.1007/978-3-319-40593-3</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861532024-05-30T17:22:35Z2024-05-30T17:22:35Zby Tryfonas, Theo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39381-0">https://doi.org/10.1007/978-3-319-39381-0</a><br/>Format: Electronic Resources<br/>The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthdayent://SD_ILS/0/SD_ILS:20861542024-05-30T17:22:35Z2024-05-30T17:22:35Zby Ryan, Peter Y. A. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49301-4">https://doi.org/10.1007/978-3-662-49301-4</a><br/>Format: Electronic Resources<br/>Formal Methods: Foundations and Applications 18th Brazilian Symposium, SBMF 2015, Belo Horizonte, Brazil, September 21-22, 2015, Proceedingsent://SD_ILS/0/SD_ILS:20861552024-05-30T17:22:35Z2024-05-30T17:22:35Zby Cornélio, Márcio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29473-5">https://doi.org/10.1007/978-3-319-29473-5</a><br/>Format: Electronic Resources<br/>Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860872024-05-30T17:22:35Z2024-05-30T17:22:35Zby Livraga, Giovanni. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47072-6">https://doi.org/10.1007/978-3-319-47072-6</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854282024-05-30T17:22:35Z2024-05-30T17:22:35Zby Monrose, Fabian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45719-2">https://doi.org/10.1007/978-3-319-45719-2</a><br/>Format: Electronic Resources<br/>Open Source Systems: Integrating Communities 12th IFIP WG 2.13 International Conference, OSS 2016, Gothenburg, Sweden, May 30 - June 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20849992024-05-30T17:22:35Z2024-05-30T17:22:35Zby Crowston, Kevin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39225-7">https://doi.org/10.1007/978-3-319-39225-7</a><br/>Format: Electronic Resources<br/>Advances in Network Science 12th International Conference and School, NetSci-X 2016, Wroclaw, Poland, January 11-13, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20855492024-05-30T17:22:35Z2024-05-30T17:22:35Zby Wierzbicki, Adam. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28361-6">https://doi.org/10.1007/978-3-319-28361-6</a><br/>Format: Electronic Resources<br/>Service-Oriented and Cloud Computing 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850822024-05-30T17:22:35Z2024-05-30T17:22:35Zby Aiello, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44482-6">https://doi.org/10.1007/978-3-319-44482-6</a><br/>Format: Electronic Resources<br/>Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859282024-05-30T17:22:35Z2024-05-30T17:22:35Zby Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46598-2">https://doi.org/10.1007/978-3-319-46598-2</a><br/>Format: Electronic Resources<br/>Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850862024-05-30T17:22:35Z2024-05-30T17:22:35Zby Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format: Electronic Resources<br/>Business Process Management 14th International Conference, BPM 2016, Rio de Janeiro, Brazil, September 18-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20857682024-05-30T17:22:35Z2024-05-30T17:22:35Zby La Rosa, Marcello. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45348-4">https://doi.org/10.1007/978-3-319-45348-4</a><br/>Format: Electronic Resources<br/>Systems, Software and Services Process Improvement 23rd European Conference, EuroSPI 2016, Graz, Austria, September 14-16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848852024-05-30T17:22:35Z2024-05-30T17:22:35Zby Kreiner, Christian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44817-6">https://doi.org/10.1007/978-3-319-44817-6</a><br/>Format: Electronic Resources<br/>Multiple Access Communications 9th International Workshop, MACOM 2016, Aalborg, Denmark, November 21-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850952024-05-30T17:22:35Z2024-05-30T17:22:35Zby Madsen, Tatiana K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51376-8">https://doi.org/10.1007/978-3-319-51376-8</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lecturesent://SD_ILS/0/SD_ILS:20858582024-05-30T17:22:35Z2024-05-30T17:22:35Zby Aldini, Alessandro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format: Electronic Resources<br/>Formal Aspects of Component Software 12th International Conference, FACS 2015, Niterói, Brazil, October 14-16, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857862024-05-30T17:22:35Z2024-05-30T17:22:35Zby Braga, Christiano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28934-2">https://doi.org/10.1007/978-3-319-28934-2</a><br/>Format: Electronic Resources<br/>FM 2016: Formal Methods 21st International Symposium, Limassol, Cyprus, November 9-11, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859582024-05-30T17:22:35Z2024-05-30T17:22:35Zby Fitzgerald, John. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48989-6">https://doi.org/10.1007/978-3-319-48989-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20859622024-05-30T17:22:35Z2024-05-30T17:22:35Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53008-5">https://doi.org/10.1007/978-3-662-53008-5</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing 14th International Conference, ICSOC 2016, Banff, AB, Canada, October 10-13, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860032024-05-30T17:22:35Z2024-05-30T17:22:35Zby Sheng, Quan Z. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46295-0">https://doi.org/10.1007/978-3-319-46295-0</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857262024-05-30T17:22:35Z2024-05-30T17:22:35Zby Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48965-0">https://doi.org/10.1007/978-3-319-48965-0</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860702024-05-30T17:22:35Z2024-05-30T17:22:35Zby Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format: Electronic Resources<br/>Web Services, Formal Methods, and Behavioral Types 11th International Workshop, WS-FM 2014, Eindhoven, The Netherlands, September 11-12, 2014, and 12th International Workshop, WS-FM/BEAT 2015, Madrid, Spain, September 4-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860782024-05-30T17:22:35Z2024-05-30T17:22:35Zby Hildebrandt, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33612-1">https://doi.org/10.1007/978-3-319-33612-1</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848392024-05-30T17:22:35Z2024-05-30T17:22:35Zby Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format: Electronic Resources<br/>Collaboration in a Hyperconnected World 17th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2016, Porto, Portugal, October 3-5, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848422024-05-30T17:22:35Z2024-05-30T17:22:35Zby Afsarmanesh, Hamideh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45390-3">https://doi.org/10.1007/978-3-319-45390-3</a><br/>Format: Electronic Resources<br/>Beyond Interpretivism? New Encounters with Technology and Organization IFIP WG 8.2 Working Conference on Information Systems and Organizations, IS&O 2016, Dublin, Ireland, December 9-10, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848432024-05-30T17:22:35Z2024-05-30T17:22:35Zby Introna, Lucas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49733-4">https://doi.org/10.1007/978-3-319-49733-4</a><br/>Format: Electronic Resources<br/>Shared Services and Outsourcing: A Contemporary Outlook 10th Global Sourcing Workshop 2016, Val d'Isère, France, February 16-19, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848462024-05-30T17:22:35Z2024-05-30T17:22:35Zby Kotlarsky, Julia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47009-2">https://doi.org/10.1007/978-3-319-47009-2</a><br/>Format: Electronic Resources<br/>Data Science and Big Data Computing Frameworks and Methodologiesent://SD_ILS/0/SD_ILS:20848742024-05-30T17:22:35Z2024-05-30T17:22:35Zby Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31861-5">https://doi.org/10.1007/978-3-319-31861-5</a><br/>Format: Electronic Resources<br/>Managing Software Process Evolution Traditional, Agile and Beyond – How to Handle Process Changeent://SD_ILS/0/SD_ILS:20850102024-05-30T17:22:35Z2024-05-30T17:22:35Zby Kuhrmann, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31545-4">https://doi.org/10.1007/978-3-319-31545-4</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857322024-05-30T17:22:35Z2024-05-30T17:22:35Zby Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29360-8">https://doi.org/10.1007/978-3-319-29360-8</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20854392024-05-30T17:22:35Z2024-05-30T17:22:35Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format: Electronic Resources<br/>Testing Software and Systems 28th IFIP WG 6.1 International Conference, ICTSS 2016, Graz, Austria, October 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854412024-05-30T17:22:35Z2024-05-30T17:22:35Zby Wotawa, Franz. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47443-4">https://doi.org/10.1007/978-3-319-47443-4</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854432024-05-30T17:22:35Z2024-05-30T17:22:35Zby Bica, Ion. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47238-6">https://doi.org/10.1007/978-3-319-47238-6</a><br/>Format: Electronic Resources<br/>System Analysis and Modeling. Technology-Specific Aspects of Models 9th International Conference, SAM 2016, Saint-Melo, France, October 3-4, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20850872024-05-30T17:22:35Z2024-05-30T17:22:35Zby Grabowski, Jens. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46613-2">https://doi.org/10.1007/978-3-319-46613-2</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850892024-05-30T17:22:35Z2024-05-30T17:22:35Zby Zhu, Quanyan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47413-7">https://doi.org/10.1007/978-3-319-47413-7</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858122024-05-30T17:22:35Z2024-05-30T17:22:35Zby Chen, Jiageng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46298-1">https://doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861582024-05-30T17:22:35Z2024-05-30T17:22:35Zby Kwon, Soonhak. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30840-1">https://doi.org/10.1007/978-3-319-30840-1</a><br/>Format: Electronic Resources<br/>Enterprise Interoperability VII Enterprise Interoperability in the Digitized and Networked Factory of the Futureent://SD_ILS/0/SD_ILS:20876942024-05-30T17:22:35Z2024-05-30T17:22:35Zby Mertins, Kai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30957-6">https://doi.org/10.1007/978-3-319-30957-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20857352024-05-30T17:22:35Z2024-05-30T17:22:35Zby Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49890-3">https://doi.org/10.1007/978-3-662-49890-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:20857362024-05-30T17:22:35Z2024-05-30T17:22:35Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53015-3">https://doi.org/10.1007/978-3-662-53015-3</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20857372024-05-30T17:22:35Z2024-05-30T17:22:35Zby Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49387-8">https://doi.org/10.1007/978-3-662-49387-8</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2–8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857442024-05-30T17:22:35Z2024-05-30T17:22:35Zby Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20857452024-05-30T17:22:35Z2024-05-30T17:22:35Zby Karagiannis, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30505-9">https://doi.org/10.1007/978-3-319-30505-9</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:20857472024-05-30T17:22:35Z2024-05-30T17:22:35Zby Homma, Naofumi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31271-2">https://doi.org/10.1007/978-3-319-31271-2</a><br/>Format: Electronic Resources<br/>Information Technology for Management Federated Conference on Computer Science and Information Systems, ISM 2015 and AITM 2015, Lodz, Poland, September 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20843342024-05-30T17:22:35Z2024-05-30T17:22:35Zby Ziemba, Ewa. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30528-8">https://doi.org/10.1007/978-3-319-30528-8</a><br/>Format: Electronic Resources<br/>Guide to Advanced Empirical Software Engineeringent://SD_ILS/0/SD_ILS:5024682024-05-30T17:22:35Z2024-05-30T17:22:35Zby Shull, Forrest. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-044-5">http://dx.doi.org/10.1007/978-1-84800-044-5</a><br/>Format: Electronic Resources<br/>Enterprise Interoperability III New Challenges and Industrial Approachesent://SD_ILS/0/SD_ILS:5025252024-05-30T17:22:35Z2024-05-30T17:22:35Zby Mertins, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-221-0">http://dx.doi.org/10.1007/978-1-84800-221-0</a><br/>Format: Electronic Resources<br/>Model Driven Architecture – Foundations and Applications 4th European Conference, ECMDA-FA 2008, Berlin, Germany, June 9-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027092024-05-30T17:22:35Z2024-05-30T17:22:35Zby Schieferdecker, Ina. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69100-6">http://dx.doi.org/10.1007/978-3-540-69100-6</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028272024-05-30T17:22:35Z2024-05-30T17:22:35Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IIIent://SD_ILS/0/SD_ILS:5026992024-05-30T17:22:35Z2024-05-30T17:22:35Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format: Electronic Resources<br/>Requirements Engineering: Foundation for Software Quality 14th International Working Conference, REFSQ 2008 Montpellier, France, June 16-17, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027042024-05-30T17:22:35Z2024-05-30T17:22:35Zby Paech, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69062-7">http://dx.doi.org/10.1007/978-3-540-69062-7</a><br/>Format: Electronic Resources<br/>Models in Software Engineering Workshops and Symposia at MoDELS 2007, Nashville, TN, USA, September 30 - October 5, 2007, Reports and Revised Selected Papersent://SD_ILS/0/SD_ILS:5027062024-05-30T17:22:35Z2024-05-30T17:22:35Zby Giese, Holger. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69073-3">http://dx.doi.org/10.1007/978-3-540-69073-3</a><br/>Format: Electronic Resources<br/>Objects, Components, Models and Patterns 46th International Conference, TOOLS EUROPE 2008, Zurich, Switzerland, June 30 - July 4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027772024-05-30T17:22:35Z2024-05-30T17:22:35Zby Paige, Richard F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69824-1">http://dx.doi.org/10.1007/978-3-540-69824-1</a><br/>Format: Electronic Resources<br/>Business Process Management Workshops BPM 2007 International Workshops, BPI, BPD, CBP, ProHealth, RefMod, semantics4ws, Brisbane, Australia, September 24, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5033392024-05-30T17:22:35Z2024-05-30T17:22:35Zby Hofstede, Arthur. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78238-4">http://dx.doi.org/10.1007/978-3-540-78238-4</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5035332024-05-30T17:22:35Z2024-05-30T17:22:35Zby Pei, Dingyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2008 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5034552024-05-30T17:22:35Z2024-05-30T17:22:35Zby Smart, Nigel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78967-3">http://dx.doi.org/10.1007/978-3-540-78967-3</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036842024-05-30T17:22:35Z2024-05-30T17:22:35Zby Lippmann, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format: Electronic Resources<br/>Public Key Cryptography – PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033722024-05-30T17:22:35Z2024-05-30T17:22:35Zby Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format: Electronic Resources<br/>Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038392024-05-30T17:22:35Z2024-05-30T17:22:35Zby Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format: Electronic Resources<br/>Web Services and Formal Methods 4th International Workshop, WS-FM 2007, Brisbane, Australia, September 28-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5034962024-05-30T17:22:35Z2024-05-30T17:22:35Zby Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79230-7">http://dx.doi.org/10.1007/978-3-540-79230-7</a><br/>Format: Electronic Resources<br/>Principles of Distributed Systems 12th International Conference, OPODIS 2008, Luxor, Egypt, December 15-18, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038572024-05-30T17:22:35Z2024-05-30T17:22:35Zby Baker, Theodore P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92221-6">http://dx.doi.org/10.1007/978-3-540-92221-6</a><br/>Format: Electronic Resources<br/>Electronic Government 7th International Conference, EGOV 2008, Turin, Italy, August 31 - September 5, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036052024-05-30T17:22:35Z2024-05-30T17:22:35Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85204-9">http://dx.doi.org/10.1007/978-3-540-85204-9</a><br/>Format: Electronic Resources<br/>Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:5037892024-05-30T17:22:35Z2024-05-30T17:22:35Zby Solanki, Kaushal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format: Electronic Resources<br/>The Practice of Enterprise Modeling First IFIP WG 8.1 Working Conference, PoEM 2008, Stockholm, Sweden, November 12-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037962024-05-30T17:22:35Z2024-05-30T17:22:35Zby Stirna, Janis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89218-2">http://dx.doi.org/10.1007/978-3-540-89218-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038002024-05-30T17:22:35Z2024-05-30T17:22:35Zby Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format: Electronic Resources<br/>Balancing Agility and Formalism in Software Engineering Second IFIP TC 2 Central and East European Conference on Software Engineering Techniques, CEE-SET 2007, Poznan, Poland, October 10-12, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5036152024-05-30T17:22:35Z2024-05-30T17:22:35Zby Meyer, Bertrand. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85279-7">http://dx.doi.org/10.1007/978-3-540-85279-7</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037082024-05-30T17:22:35Z2024-05-30T17:22:35Zby Harrison, Michael D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format: Electronic Resources<br/>Software Process and Product Measurement International Conferences IWSM 2008, Metrikon 2008, and Mensura 2008 Munich, Germany, November 18-19, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038092024-05-30T17:22:35Z2024-05-30T17:22:35Zby Dumke, Reiner R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89403-2">http://dx.doi.org/10.1007/978-3-540-89403-2</a><br/>Format: Electronic Resources<br/>Software Process and Product Measurement International Conference, IWSM-Mensura 2007, Palma de Mallorca, Spain, November 5-8, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5036342024-05-30T17:22:35Z2024-05-30T17:22:35Zby Cuadrado-Gallego, Juan J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85553-8">http://dx.doi.org/10.1007/978-3-540-85553-8</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part Ient://SD_ILS/0/SD_ILS:5036362024-05-30T17:22:35Z2024-05-30T17:22:35Zby Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85563-7">http://dx.doi.org/10.1007/978-3-540-85563-7</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5036372024-05-30T17:22:35Z2024-05-30T17:22:35Zby Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85565-1">http://dx.doi.org/10.1007/978-3-540-85565-1</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036602024-05-30T17:22:35Z2024-05-30T17:22:35Zby Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036642024-05-30T17:22:35Z2024-05-30T17:22:35Zby Grimaud, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format: Electronic Resources<br/>Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037492024-05-30T17:22:35Z2024-05-30T17:22:35Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037532024-05-30T17:22:35Z2024-05-30T17:22:35Zby Buchmann, Johannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format: Electronic Resources<br/>IP Operations and Management 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036802024-05-30T17:22:35Z2024-05-30T17:22:35Zby Akar, Nail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87357-0">http://dx.doi.org/10.1007/978-3-540-87357-0</a><br/>Format: Electronic Resources<br/>Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035862024-05-30T17:22:35Z2024-05-30T17:22:35Zby Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5037932024-05-30T17:22:35Z2024-05-30T17:22:35Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038052024-05-30T17:22:35Z2024-05-30T17:22:35Zby Kulkarni, Sandeep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89335-6">http://dx.doi.org/10.1007/978-3-540-89335-6</a><br/>Format: Electronic Resources<br/>Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028122024-05-30T17:22:35Z2024-05-30T17:22:35Zby Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70567-3">http://dx.doi.org/10.1007/978-3-540-70567-3</a><br/>Format: Electronic Resources<br/>Object-Oriented Technology. ECOOP 2007 Workshop Reader ECOOP 2007 Workshops, Berlin, Germany, July 30-31, 2007, Final Reportsent://SD_ILS/0/SD_ILS:5033352024-05-30T17:22:35Z2024-05-30T17:22:35Zby Cebulla, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78195-0">http://dx.doi.org/10.1007/978-3-540-78195-0</a><br/>Format: Electronic Resources<br/>Emerging Technologies and Information Systems for the Knowledge Society First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037172024-05-30T17:22:35Z2024-05-30T17:22:35Zby Lytras, Miltiadis D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87781-3">http://dx.doi.org/10.1007/978-3-540-87781-3</a><br/>Format: Electronic Resources<br/>The Open Knowlege Society. A Computer Science and Information Systems Manifesto First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037182024-05-30T17:22:35Z2024-05-30T17:22:35Zby Lytras, Miltiadis D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87783-7">http://dx.doi.org/10.1007/978-3-540-87783-7</a><br/>Format: Electronic Resources<br/>Software Technologies for Embedded and Ubiquitous Systems 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037192024-05-30T17:22:35Z2024-05-30T17:22:35Zby Brinkschulte, Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87785-1">http://dx.doi.org/10.1007/978-3-540-87785-1</a><br/>Format: Electronic Resources<br/>Making Globally Distributed Software Development a Success Story International Conference on Software Process, ICSP 2008 Leipzig, Germany, May 10-11, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5035442024-05-30T17:22:35Z2024-05-30T17:22:35Zby Wang, Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79588-9">http://dx.doi.org/10.1007/978-3-540-79588-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036002024-05-30T17:22:35Z2024-05-30T17:22:35Zby Wagner, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format: Electronic Resources<br/>Advances in Ad Hoc Networking Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25–27, 2008ent://SD_ILS/0/SD_ILS:5015232024-05-30T17:22:35Z2024-05-30T17:22:35Zby Cuenca, Pedro. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09490-8">http://dx.doi.org/10.1007/978-0-387-09490-8</a><br/>Format: Electronic Resources<br/>Resilient Networks and Services Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028182024-05-30T17:22:35Z2024-05-30T17:22:35Zby Hausheer, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70587-1">http://dx.doi.org/10.1007/978-3-540-70587-1</a><br/>Format: Electronic Resources<br/>ECOOP 2008 – Object-Oriented Programming 22nd European Conference Paphos, Cyprus, July 7-11, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028202024-05-30T17:22:35Z2024-05-30T17:22:35Zby Vitek, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70592-5">http://dx.doi.org/10.1007/978-3-540-70592-5</a><br/>Format: Electronic Resources<br/>Requirements Management The Interface Between Requirements Development and All Other Systems Engineering Processesent://SD_ILS/0/SD_ILS:5026462024-05-30T17:22:35Z2024-05-30T17:22:35Zby Hood, Colin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68476-3">http://dx.doi.org/10.1007/978-3-540-68476-3</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027302024-05-30T17:22:35Z2024-05-30T17:22:35Zby Rong, Chunming. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69295-9">http://dx.doi.org/10.1007/978-3-540-69295-9</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027562024-05-30T17:22:35Z2024-05-30T17:22:35Zby Mjølsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69485-4">http://dx.doi.org/10.1007/978-3-540-69485-4</a><br/>Format: Electronic Resources<br/>Model-Driven Testingent://SD_ILS/0/SD_ILS:5028922024-05-30T17:22:35Z2024-05-30T17:22:35Zby Baker, Paul. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72563-3">http://dx.doi.org/10.1007/978-3-540-72563-3</a><br/>Format: Electronic Resources<br/>Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:5015462024-05-30T17:22:35Z2024-05-30T17:22:35Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection IIent://SD_ILS/0/SD_ILS:5020092024-05-30T17:22:35Z2024-05-30T17:22:35Zby Papa, Mauricio. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-88523-0">http://dx.doi.org/10.1007/978-0-387-88523-0</a><br/>Format: Electronic Resources<br/>Pervasive Collaborative Networks IFIP TC 5 WG 5.5 Ninth Working Conference on VIRTUAL ENTERPRISES, September 8-10, 2008, Poznan, Polandent://SD_ILS/0/SD_ILS:5019982024-05-30T17:22:35Z2024-05-30T17:22:35Zby Camarinha-Matos, Luis M. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-84837-2">http://dx.doi.org/10.1007/978-0-387-84837-2</a><br/>Format: Electronic Resources<br/>High Confidence Software Reuse in Large Systems 10th International Conference on Software Reuse, ICSR 2008, Beijing, China, May 25-29, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026132024-05-30T17:22:35Z2024-05-30T17:22:35Zby Mei, Hong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68073-4">http://dx.doi.org/10.1007/978-3-540-68073-4</a><br/>Format: Electronic Resources<br/>Service Availability 5th International Service Availability Symposium, ISAS 2008 Tokyo, Japan, May 19-21, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026202024-05-30T17:22:35Z2024-05-30T17:22:35Zby Nanya, Takashi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68129-8">http://dx.doi.org/10.1007/978-3-540-68129-8</a><br/>Format: Electronic Resources<br/>The IT Measurement Compendium Estimating and Benchmarking Success with Functional Size Measurementent://SD_ILS/0/SD_ILS:5026272024-05-30T17:22:35Z2024-05-30T17:22:35Zby Bundschuh, Manfred. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68188-5">http://dx.doi.org/10.1007/978-3-540-68188-5</a><br/>Format: Electronic Resources<br/>Testing of Software and Communicating Systems 20th IFIP TC 6/WG 6.1 International Conference, TestCom 2008 8th International Workshop, FATES 2008 Tokyo, Japan, June 10-13, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026522024-05-30T17:22:35Z2024-05-30T17:22:35Zby Suzuki, Kenji. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68524-1">http://dx.doi.org/10.1007/978-3-540-68524-1</a><br/>Format: Electronic Resources<br/>Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027502024-05-30T17:22:35Z2024-05-30T17:22:35Zby Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format: Electronic Resources<br/>Product-Focused Software Process Improvement 9th International Conference, PROFES 2008 Monte Porzio Catone, Italy, June 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027642024-05-30T17:22:35Z2024-05-30T17:22:35Zby Jedlitschka, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69566-0">http://dx.doi.org/10.1007/978-3-540-69566-0</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5036492024-05-30T17:22:35Z2024-05-30T17:22:35Zby Furnell, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format: Electronic Resources<br/>Business Process Management 6th International Conference, BPM 2008, Milan, Italy, September 2-4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036502024-05-30T17:22:35Z2024-05-30T17:22:35Zby Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85758-7">http://dx.doi.org/10.1007/978-3-540-85758-7</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038322024-05-30T17:22:35Z2024-05-30T17:22:35Zby Chowdhury, Dipanwita Roy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89754-5">http://dx.doi.org/10.1007/978-3-540-89754-5</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035632024-05-30T17:22:35Z2024-05-30T17:22:35Zby Onieva, Jose A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format: Electronic Resources<br/>Advanced Methods for Inconsistent Knowledge Managementent://SD_ILS/0/SD_ILS:5024342024-05-30T17:22:35Z2024-05-30T17:22:35Zby Nguyen, Ngoc Thanh. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-889-0">http://dx.doi.org/10.1007/978-1-84628-889-0</a><br/>Format: Electronic Resources<br/>Resources, Co-Evolution and Artifacts Theory in CSCWent://SD_ILS/0/SD_ILS:5024352024-05-30T17:22:35Z2024-05-30T17:22:35Zby Ackerman, Mark S. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-901-9">http://dx.doi.org/10.1007/978-1-84628-901-9</a><br/>Format: Electronic Resources<br/>Itil® Version 3 at a Glance Information Quick Referenceent://SD_ILS/0/SD_ILS:5019182024-05-30T17:22:35Z2024-05-30T17:22:35Zby Long, John O. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77393-3">http://dx.doi.org/10.1007/978-0-387-77393-3</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026912024-05-30T17:22:35Z2024-05-30T17:22:35Zby Bellovin, Steven M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Electronic Resources<br/>Software Evolutionent://SD_ILS/0/SD_ILS:5031722024-05-30T17:22:35Z2024-05-30T17:22:35Zby Mens, Tom. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76440-3">http://dx.doi.org/10.1007/978-3-540-76440-3</a><br/>Format: Electronic Resources<br/>Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036132024-05-30T17:22:35Z2024-05-30T17:22:35Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85259-9">http://dx.doi.org/10.1007/978-3-540-85259-9</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5028032024-05-30T17:22:35Z2024-05-30T17:22:35Zby Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038182024-05-30T17:22:35Z2024-05-30T17:22:35Zby Matsuura, Kanta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format: Electronic Resources<br/>Model Driven Engineering Languages and Systems 11th International Conference, MoDELS 2008, Toulouse, France, September 28 - October 3, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037242024-05-30T17:22:35Z2024-05-30T17:22:35Zby Czarnecki, Krzysztof. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87875-9">http://dx.doi.org/10.1007/978-3-540-87875-9</a><br/>Format: Electronic Resources<br/>Biosurveillance and Biosecurity International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038312024-05-30T17:22:35Z2024-05-30T17:22:35Zby Zeng, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89746-0">http://dx.doi.org/10.1007/978-3-540-89746-0</a><br/>Format: Electronic Resources<br/>Emerging Web Services Technology, Volume IIent://SD_ILS/0/SD_ILS:5039422024-05-30T17:22:35Z2024-05-30T17:22:35Zby Gschwind, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-7643-8864-5">http://dx.doi.org/10.1007/978-3-7643-8864-5</a><br/>Format: Electronic Resources<br/>Managing Large-Scale Service Deployment 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036782024-05-30T17:22:35Z2024-05-30T17:22:35Zby Turck, Filip. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87353-2">http://dx.doi.org/10.1007/978-3-540-87353-2</a><br/>Format: Electronic Resources<br/>Modelling Autonomic Communications Environments Third IEEE International Workshop, MACE 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036792024-05-30T17:22:35Z2024-05-30T17:22:35Zby Meer, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87355-6">http://dx.doi.org/10.1007/978-3-540-87355-6</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5034812024-05-30T17:22:35Z2024-05-30T17:22:35Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data and Processes Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake City, UT, USA, June 17-18, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5038462024-05-30T17:22:35Z2024-05-30T17:22:35Zby Freire, Juliana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89965-5">http://dx.doi.org/10.1007/978-3-540-89965-5</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2008 The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035032024-05-30T17:22:35Z2024-05-30T17:22:35Zby Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79263-5">http://dx.doi.org/10.1007/978-3-540-79263-5</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5036102024-05-30T17:22:35Z2024-05-30T17:22:35Zby Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format: Electronic Resources<br/>Rationale-Based Software Engineeringent://SD_ILS/0/SD_ILS:5032702024-05-30T17:22:35Z2024-05-30T17:22:35Zby Burge, Janet E. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77583-6">http://dx.doi.org/10.1007/978-3-540-77583-6</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks in Pattern Recognition Third IAPR Workshop, ANNPR 2008 Paris, France, July 2-4, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027912024-05-30T17:22:35Z2024-05-30T17:22:35Zby Prevost, Lionel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69939-2">http://dx.doi.org/10.1007/978-3-540-69939-2</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027932024-05-30T17:22:35Z2024-05-30T17:22:35Zby Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format: Electronic Resources<br/>TestGoal Result-Driven Testingent://SD_ILS/0/SD_ILS:5034392024-05-30T17:22:35Z2024-05-30T17:22:35Zby De Grood, Derk-Jan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78829-4">http://dx.doi.org/10.1007/978-3-540-78829-4</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:5036382024-05-30T17:22:35Z2024-05-30T17:22:35Zby Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85567-5">http://dx.doi.org/10.1007/978-3-540-85567-5</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038212024-05-30T17:22:35Z2024-05-30T17:22:35Zby Franklin, Matthew K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format: Electronic Resources<br/>Formal Methods and Testing An Outcome of the FORTEST Network, Revised Selected Papersent://SD_ILS/0/SD_ILS:5034492024-05-30T17:22:35Z2024-05-30T17:22:35Zby Hierons, Robert M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78917-8">http://dx.doi.org/10.1007/978-3-540-78917-8</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038432024-05-30T17:22:35Z2024-05-30T17:22:35Zby Ortiz-Arroyo, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89900-6">http://dx.doi.org/10.1007/978-3-540-89900-6</a><br/>Format: Electronic Resources<br/>Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5033752024-05-30T17:22:35Z2024-05-30T17:22:35Zby Bonchi, Francesco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78478-4">http://dx.doi.org/10.1007/978-3-540-78478-4</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033872024-05-30T17:22:35Z2024-05-30T17:22:35Zby Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format: Electronic Resources<br/>Data Management in Grid and Peer-to-Peer Systems First International Conference, Globe 2008, Turin, Italy, September 3, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036012024-05-30T17:22:35Z2024-05-30T17:22:35Zby Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85176-9">http://dx.doi.org/10.1007/978-3-540-85176-9</a><br/>Format: Electronic Resources<br/>Modelling, Computation and Optimization in Information Systems and Management Sciences Second International Conference MCO 2008, Metz, France - Luxembourg, September 8-10, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036922024-05-30T17:22:35Z2024-05-30T17:22:35Zby Le Thi, Hoai An. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87477-5">http://dx.doi.org/10.1007/978-3-540-87477-5</a><br/>Format: Electronic Resources<br/>Open Source Development, Communities and Quality IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:5015432024-05-30T17:22:35Z2024-05-30T17:22:35Zby Russo, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09684-1">http://dx.doi.org/10.1007/978-0-387-09684-1</a><br/>Format: Electronic Resources<br/>Policies and Research in Identity Management First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007ent://SD_ILS/0/SD_ILS:5019392024-05-30T17:22:35Z2024-05-30T17:22:35Zby Leeuw, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77996-6">http://dx.doi.org/10.1007/978-0-387-77996-6</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2008 First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026232024-05-30T17:22:35Z2024-05-30T17:22:35Zby Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68164-9">http://dx.doi.org/10.1007/978-3-540-68164-9</a><br/>Format: Electronic Resources<br/>FM 2008: Formal Methods 15th International Symposium on Formal Methods, Turku, Finland, May 26-30, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026332024-05-30T17:22:35Z2024-05-30T17:22:35Zby Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68237-0">http://dx.doi.org/10.1007/978-3-540-68237-0</a><br/>Format: Electronic Resources<br/>Agile Processes in Software Engineering and Extreme Programming 9th International Conference, XP 2008, Limerick, Ireland, June 10-14, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026342024-05-30T17:22:35Z2024-05-30T17:22:35Zby Abrahamsson, Pekka. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68255-4">http://dx.doi.org/10.1007/978-3-540-68255-4</a><br/>Format: Electronic Resources<br/>Reliable Software Technologies – Ada-Europe 2008 13th Ada-Europe International Conference on Reliable Software Technologies, Venice, Italy, June 16-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026622024-05-30T17:22:35Z2024-05-30T17:22:35Zby Kordon, Fabrice. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68624-8">http://dx.doi.org/10.1007/978-3-540-68624-8</a><br/>Format: Electronic Resources<br/>Rightshore! Successfully SAP(R) Projects Offshoreent://SD_ILS/0/SD_ILS:5032262024-05-30T17:22:35Z2024-05-30T17:22:35Zby Messner, Wolfgang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77288-0">http://dx.doi.org/10.1007/978-3-540-77288-0</a><br/>Format: Electronic Resources<br/>Active Knowledge Modeling of Enterprisesent://SD_ILS/0/SD_ILS:5035192024-05-30T17:22:35Z2024-05-30T17:22:35Zby Lillehagen, Frank. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79416-5">http://dx.doi.org/10.1007/978-3-540-79416-5</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papersent://SD_ILS/0/SD_ILS:5130332024-05-30T17:22:35Z2024-05-30T17:22:35Zby Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format: Electronic Resources<br/>Advances in Hybrid Information Technology First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130342024-05-30T17:22:35Z2024-05-30T17:22:35Zby Szczuka, Marcin S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77368-9">http://dx.doi.org/10.1007/978-3-540-77368-9</a><br/>Format: Electronic Resources<br/>Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130352024-05-30T17:22:35Z2024-05-30T17:22:35Zby Furon, Teddy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77370-2">http://dx.doi.org/10.1007/978-3-540-77370-2</a><br/>Format: Electronic Resources<br/>Runtime Verification 7th International Workshop, RV 2007, Vancover, Canada, March 13, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130362024-05-30T17:22:35Z2024-05-30T17:22:35Zby Sokolsky, Oleg. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77395-5">http://dx.doi.org/10.1007/978-3-540-77395-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127612024-05-30T17:22:35Z2024-05-30T17:22:35Zby Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format: Electronic Resources<br/>IP Operations and Management 7th IEEE International Workshop, IPOM 2007 San José, USA, October 31 - November 2, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129422024-05-30T17:22:35Z2024-05-30T17:22:35Zby Medhi, Deep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75853-2">http://dx.doi.org/10.1007/978-3-540-75853-2</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:5127932024-05-30T17:22:35Z2024-05-30T17:22:35Zby Biham, Eli. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format: Electronic Resources<br/>Requirements Engineering: Foundation for Software Quality 13th International Working Conference, REFSQ 2007, Trondheim, Norway, June 11-12, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125812024-05-30T17:22:35Z2024-05-30T17:22:35Zby Sawyer, Pete. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73031-6">http://dx.doi.org/10.1007/978-3-540-73031-6</a><br/>Format: Electronic Resources<br/>E-Voting and Identity First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130402024-05-30T17:22:35Z2024-05-30T17:22:35Zby Alkassar, Ammar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77493-8">http://dx.doi.org/10.1007/978-3-540-77493-8</a><br/>Format: Electronic Resources<br/>Data and Applications Security XXI 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126872024-05-30T17:22:35Z2024-05-30T17:22:35Zby Barker, Steve. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73538-0">http://dx.doi.org/10.1007/978-3-540-73538-0</a><br/>Format: Electronic Resources<br/>Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129892024-05-30T17:22:35Z2024-05-30T17:22:35Zby Cervesato, Iliano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format: Electronic Resources<br/>Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papersent://SD_ILS/0/SD_ILS:5127562024-05-30T17:22:35Z2024-05-30T17:22:35Zby Camenisch, Jan L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126602024-05-30T17:22:35Z2024-05-30T17:22:35Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73408-6">http://dx.doi.org/10.1007/978-3-540-73408-6</a><br/>Format: Electronic Resources<br/>SDL 2007: Design for Dependable Systems 13th International SDL Forum Paris, France, September 18-21, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5128662024-05-30T17:22:35Z2024-05-30T17:22:35Zby Gaudin, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74984-4">http://dx.doi.org/10.1007/978-3-540-74984-4</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics: Biosurveillance Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May 22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125042024-05-30T17:22:35Z2024-05-30T17:22:35Zby Zeng, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72608-1">http://dx.doi.org/10.1007/978-3-540-72608-1</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5128882024-05-30T17:22:35Z2024-05-30T17:22:35Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">http://dx.doi.org/10.1007/978-3-540-75227-1</a><br/>Format: Electronic Resources<br/>Secure Data Management 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128892024-05-30T17:22:35Z2024-05-30T17:22:35Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75248-6">http://dx.doi.org/10.1007/978-3-540-75248-6</a><br/>Format: Electronic Resources<br/>Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129982024-05-30T17:22:35Z2024-05-30T17:22:35Zby Zhang, Hongke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2007 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129992024-05-30T17:22:35Z2024-05-30T17:22:35Zby Srinathan, K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77026-8">http://dx.doi.org/10.1007/978-3-540-77026-8</a><br/>Format: Electronic Resources<br/>Transactions on Aspect-Oriented Software Development IVent://SD_ILS/0/SD_ILS:5130022024-05-30T17:22:35Z2024-05-30T17:22:35Zby Rashid, Awais. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77042-8">http://dx.doi.org/10.1007/978-3-540-77042-8</a><br/>Format: Electronic Resources<br/>Software Product Lines in Action The Best Industrial Practice in Product Line Engineeringent://SD_ILS/0/SD_ILS:5123412024-05-30T17:22:35Z2024-05-30T17:22:35Zby Linden, Frank. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71437-8">http://dx.doi.org/10.1007/978-3-540-71437-8</a><br/>Format: Electronic Resources<br/>Reliable Software Technologies – Ada Europe 2007 12th Ada-Europe International Conference on Reliable Software Technologies, Geneva, Switzerland, June 25-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126212024-05-30T17:22:35Z2024-05-30T17:22:35Zby Abdennadher, Nabil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73230-3">http://dx.doi.org/10.1007/978-3-540-73230-3</a><br/>Format: Electronic Resources<br/>Online Communities and Social Computing Second International Conference, OCSC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126232024-05-30T17:22:35Z2024-05-30T17:22:35Zby Schuler, Douglas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73257-0">http://dx.doi.org/10.1007/978-3-540-73257-0</a><br/>Format: Electronic Resources<br/>Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126262024-05-30T17:22:35Z2024-05-30T17:22:35Zby Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Format: Electronic Resources<br/>Models in Software Engineering Workshops and Symposia at MoDELS 2006, Genoa, Italy, October 1-6, 2006, Reports and Revised Selected Papersent://SD_ILS/0/SD_ILS:5121642024-05-30T17:22:35Z2024-05-30T17:22:35Zby Kühne, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69489-2">http://dx.doi.org/10.1007/978-3-540-69489-2</a><br/>Format: Electronic Resources<br/>