Search Results for - Narrowed by: English - TEDU library - Computer Communication Networks. - Management of Computing and Information Systems. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLANGUAGE$002509Dil$002509ENG$002509English$0026qf$003dLIBRARY$002509K$0025C3$0025BCt$0025C3$0025BCphane$0025091$00253ATEDU$002509TEDU$002blibrary$0026qf$003dSUBJECT$002509Konu$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026qf$003dSUBJECT$002509Konu$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026ps$003d300? 2024-06-29T01:22:29Z Product Lifecycle Management in the Digital Twin Era 16th IFIP WG 5.1 International Conference, PLM 2019, Moscow, Russia, July 8&ndash;12, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428987 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Fortin, Clement. editor.<br/><a href="https://doi.org/10.1007/978-3-030-42250-9">https://doi.org/10.1007/978-3-030-42250-9</a><br/>Format:&#160;Electronic Resources<br/> Agile Methods 10th Brazilian Workshop, WBMA 2019, Belo Horizonte, Brazil, September 11, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:429185 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Meirelles, Paulo. editor. (orcid)0000-0002-8923-2814<br/><a href="https://doi.org/10.1007/978-3-030-36701-5">https://doi.org/10.1007/978-3-030-36701-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:428546 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format:&#160;Electronic Resources<br/> Economic Models for Managing Cloud Services ent://SD_ILS/0/SD_ILS:226367 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Mistry, Sajib. author.<br/><a href="https://doi.org/10.1007/978-3-319-73876-5">https://doi.org/10.1007/978-3-319-73876-5</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Mobile Data Privacy ent://SD_ILS/0/SD_ILS:222033 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Gkoulalas-Divanis, Aris. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format:&#160;Electronic Resources<br/> Crowdsourcing of Sensor Cloud Services ent://SD_ILS/0/SD_ILS:224928 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Ghari Neiat, Azadeh . author.<br/><a href="https://doi.org/10.1007/978-3-319-91536-4">https://doi.org/10.1007/978-3-319-91536-4</a><br/>Format:&#160;Electronic Resources<br/> Smart Cities Development and Governance Frameworks ent://SD_ILS/0/SD_ILS:222904 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76669-0">https://doi.org/10.1007/978-3-319-76669-0</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:222808 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222594 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2018 The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222850 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Smart, Nigel P. editor. (orcid)0000-0003-3567-3304<br/><a href="https://doi.org/10.1007/978-3-319-76953-0">https://doi.org/10.1007/978-3-319-76953-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221828 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing Strategies for Engineering 25th EG-ICE International Workshop 2018, Lausanne, Switzerland, June 10-13, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:221396 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Smith, Ian F. C. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91638-5">https://doi.org/10.1007/978-3-319-91638-5</a><br/>Format:&#160;Electronic Resources<br/> Fog Computing Concepts, Frameworks and Technologies ent://SD_ILS/0/SD_ILS:226869 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94890-4">https://doi.org/10.1007/978-3-319-94890-4</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing Strategies for Engineering 25th EG-ICE International Workshop 2018, Lausanne, Switzerland, June 10-13, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:225553 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Smith, Ian F. C. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91635-4">https://doi.org/10.1007/978-3-319-91635-4</a><br/>Format:&#160;Electronic Resources<br/> Testing Software and Systems 29th IFIP WG 6.1 International Conference, ICTSS 2017, St. Petersburg, Russia, October 9-11, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226638 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Yevtushenko, Nina. editor. (orcid)0000-0002-4006-1161<br/><a href="https://doi.org/10.1007/978-3-319-67549-7">https://doi.org/10.1007/978-3-319-67549-7</a><br/>Format:&#160;Electronic Resources<br/> Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:226046 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/978-3-319-55606-2">https://doi.org/10.1007/978-3-319-55606-2</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 11th International Conference, NSS 2017, Helsinki, Finland, August 21&ndash;23, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226900 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Yan, Zheng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64701-2">https://doi.org/10.1007/978-3-319-64701-2</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:226935 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54365-8">https://doi.org/10.1007/978-3-662-54365-8</a><br/>Format:&#160;Electronic Resources<br/> Paradigms in Cryptology &ndash; Mycrypt 2016. Malicious and Exploratory Cryptology Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226158 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Phan, Rapha&euml;l C.-W. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61273-7">https://doi.org/10.1007/978-3-319-61273-7</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Security Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 &ndash; December 3, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226619 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Chang, Victor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54380-2">https://doi.org/10.1007/978-3-319-54380-2</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223564 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64483-7">https://doi.org/10.1007/978-3-319-64483-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:223844 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Choi, Dooho. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56549-1">https://doi.org/10.1007/978-3-319-56549-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 &ndash; September 1, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225140 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Obana, Satoshi. editor. (orcid)0000-0003-4795-4779<br/><a href="https://doi.org/10.1007/978-3-319-64200-0">https://doi.org/10.1007/978-3-319-64200-0</a><br/>Format:&#160;Electronic Resources<br/> Software Project Management for Distributed Computing Life-Cycle Methods for Developing Scalable and Reliable Tools ent://SD_ILS/0/SD_ILS:225143 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54325-3">https://doi.org/10.1007/978-3-319-54325-3</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2017 The Cryptographers&rsquo; Track at the RSA Conference 2017, San Francisco, CA, USA, February 14&ndash;17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224973 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Handschuh, Helena. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52153-4">https://doi.org/10.1007/978-3-319-52153-4</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:224426 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Fehr, Serge. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54388-7">https://doi.org/10.1007/978-3-662-54388-7</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:221571 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68542-7">https://doi.org/10.1007/978-3-319-68542-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20&ndash;24, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:221654 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63688-7">https://doi.org/10.1007/978-3-319-63688-7</a><br/>Format:&#160;Electronic Resources<br/> Wireless Algorithms, Systems, and Applications 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221730 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Ma, Liran. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60033-8">https://doi.org/10.1007/978-3-319-60033-8</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXIV 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221738 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Anderson, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-62033-6">https://doi.org/10.1007/978-3-319-62033-6</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18&ndash;20, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224543 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Dacier, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66332-6">https://doi.org/10.1007/978-3-319-66332-6</a><br/>Format:&#160;Electronic Resources<br/> Connected Environments for the Internet of Things Challenges and Solutions ent://SD_ILS/0/SD_ILS:225499 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70102-8">https://doi.org/10.1007/978-3-319-70102-8</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225700 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Rass, Stefan. editor. (orcid)0000-0003-2821-2489<br/><a href="https://doi.org/10.1007/978-3-319-68711-7">https://doi.org/10.1007/978-3-319-68711-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20&ndash;24, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:225795 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63715-0">https://doi.org/10.1007/978-3-319-63715-0</a><br/>Format:&#160;Electronic Resources<br/> Serviceology for Services 5th International Conference, ICServ 2017, Vienna, Austria, July 12-14, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225729 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Hara, Yoshinori. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61240-9">https://doi.org/10.1007/978-3-319-61240-9</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:225408 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68505-2">https://doi.org/10.1007/978-3-319-68505-2</a><br/>Format:&#160;Electronic Resources<br/> Risk Assessment and Risk-Driven Quality Assurance 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226913 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Gro&szlig;mann, J&uuml;rgen. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57858-3">https://doi.org/10.1007/978-3-319-57858-3</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Services Science 5th International Conference, CLOSER 2015, Lisbon, Portugal, May 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17381 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Helfert, Markus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29582-4">http://dx.doi.org/10.1007/978-3-319-29582-4</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17675 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31811-0">http://dx.doi.org/10.1007/978-3-319-31811-0</a><br/>Format:&#160;Electronic Resources<br/> Data Science and Big Data Computing Frameworks and Methodologies ent://SD_ILS/0/SD_ILS:17680 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Mahmood, Zaigham. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31861-5">http://dx.doi.org/10.1007/978-3-319-31861-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18282 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Ogawa, Kazuto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44524-3">http://dx.doi.org/10.1007/978-3-319-44524-3</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 &ndash; September 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18288 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Zikas, Vassilis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44618-9">http://dx.doi.org/10.1007/978-3-319-44618-9</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing 14th International Conference, ICSOC 2016, Banff, AB, Canada, October 10-13, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18378 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Sheng, Quan Z. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46295-0">http://dx.doi.org/10.1007/978-3-319-46295-0</a><br/>Format:&#160;Electronic Resources<br/> System Analysis and Modeling. Technology-Specific Aspects of Models 9th International Conference, SAM 2016, Saint-Melo, France, October 3-4, 2016. Proceedings ent://SD_ILS/0/SD_ILS:18399 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Grabowski, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46613-2">http://dx.doi.org/10.1007/978-3-319-46613-2</a><br/>Format:&#160;Electronic Resources<br/> Wireless Algorithms, Systems, and Applications 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings ent://SD_ILS/0/SD_ILS:18223 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Yang, Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42836-9">http://dx.doi.org/10.1007/978-3-319-42836-9</a><br/>Format:&#160;Electronic Resources<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17955 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39028-4">http://dx.doi.org/10.1007/978-3-319-39028-4</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings ent://SD_ILS/0/SD_ILS:17521 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Karagiannis, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30505-9">http://dx.doi.org/10.1007/978-3-319-30505-9</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7&ndash;9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:17428 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29938-9">http://dx.doi.org/10.1007/978-3-319-29938-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17683 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Kim, Ho-won. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31875-2">http://dx.doi.org/10.1007/978-3-319-31875-2</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18270 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44341-6">http://dx.doi.org/10.1007/978-3-319-44341-6</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18653 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49635-0">http://dx.doi.org/10.1007/978-3-662-49635-0</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18342 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Monrose, Fabian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45719-2">http://dx.doi.org/10.1007/978-3-319-45719-2</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18684 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Gierlichs, Benedikt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53140-2">http://dx.doi.org/10.1007/978-3-662-53140-2</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17837 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Rome, Erich. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33331-1">http://dx.doi.org/10.1007/978-3-319-33331-1</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing &ndash; ICSOC 2015 Workshops WESOA, RMSOC, ISC, DISCO, WESE, BSCI, FOR-MOVES, Goa, India, November 16-19, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18668 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Norta, Alex. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-50539-7">http://dx.doi.org/10.1007/978-3-662-50539-7</a><br/>Format:&#160;Electronic Resources<br/> Mobility Management Principle, Technology and Applications ent://SD_ILS/0/SD_ILS:18671 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Chen, Shanzhi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-52726-9">http://dx.doi.org/10.1007/978-3-662-52726-9</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:18006 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17413 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29814-6">http://dx.doi.org/10.1007/978-3-319-29814-6</a><br/>Format:&#160;Electronic Resources<br/> Mathematical and Engineering Methods in Computer Science 10th International Doctoral Workshop, MEMICS 2015, Telč, Czech Republic, October 23-25, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17414 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Kofroň, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29817-7">http://dx.doi.org/10.1007/978-3-319-29817-7</a><br/>Format:&#160;Electronic Resources<br/> Web Services, Formal Methods, and Behavioral Types 11th International Workshop, WS-FM 2014, Eindhoven, The Netherlands, September 11-12, 2014, and 12th International Workshop, WS-FM/BEAT 2015, Madrid, Spain, September 4-5, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17864 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Hildebrandt, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33612-1">http://dx.doi.org/10.1007/978-3-319-33612-1</a><br/>Format:&#160;Electronic Resources<br/> Software Engineering for Resilient Systems 8th International Workshop, SERENE 2016, Gothenburg, Sweden, September 5-6, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18356 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Crnkovic, Ivica. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45892-2">http://dx.doi.org/10.1007/978-3-319-45892-2</a><br/>Format:&#160;Electronic Resources<br/> Modelling Foundations and Applications 12th European Conference, ECMFA 2016, Held as Part of STAF 2016, Vienna, Austria, July 6-7, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18185 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Wąsowski, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42061-5">http://dx.doi.org/10.1007/978-3-319-42061-5</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18379 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format:&#160;Electronic Resources<br/> Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18030 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Badonnel, R&eacute;mi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39814-3">http://dx.doi.org/10.1007/978-3-319-39814-3</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:22323 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Rhee, Kyung-Hyune. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15087-1">http://dx.doi.org/10.1007/978-3-319-15087-1</a><br/>Format:&#160;Electronic Resources<br/> Wireless Algorithms, Systems, and Applications 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23167 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Xu, Kuai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21837-3">http://dx.doi.org/10.1007/978-3-319-21837-3</a><br/>Format:&#160;Electronic Resources<br/> Traffic Monitoring and Analysis 7th International Workshop, TMA 2015, Barcelona, Spain, April 21-24, 2015. Proceedings ent://SD_ILS/0/SD_ILS:22648 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Steiner, Moritz. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17172-2">http://dx.doi.org/10.1007/978-3-319-17172-2</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23182 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Hui, Lucas C. K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21966-0">http://dx.doi.org/10.1007/978-3-319-21966-0</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:23143 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21476-4">http://dx.doi.org/10.1007/978-3-319-21476-4</a><br/>Format:&#160;Electronic Resources<br/> Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23609 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27998-5">http://dx.doi.org/10.1007/978-3-319-27998-5</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23614 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23546 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Reiter, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26823-1">http://dx.doi.org/10.1007/978-3-319-26823-1</a><br/>Format:&#160;Electronic Resources<br/> Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:19565 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6654-2">http://dx.doi.org/10.1007/978-1-4471-6654-2</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23344 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Mj&oslash;lsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24192-0">http://dx.doi.org/10.1007/978-3-319-24192-0</a><br/>Format:&#160;Electronic Resources<br/> Accountability and Security in the Cloud First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures ent://SD_ILS/0/SD_ILS:22653 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Felici, Massimo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17199-9">http://dx.doi.org/10.1007/978-3-319-17199-9</a><br/>Format:&#160;Electronic Resources<br/> Modelling Foundations and Applications 11th European Conference, ECMFA 2015, Held as Part of STAF 2015, L`Aquila, Italy, July 20-24, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23112 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Taentzer, Gabriele. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21151-0">http://dx.doi.org/10.1007/978-3-319-21151-0</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23471 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Qiu, Meikang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25645-0">http://dx.doi.org/10.1007/978-3-319-25645-0</a><br/>Format:&#160;Electronic Resources<br/> Algorithms and Architectures for Parallel Processing ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23569 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Wang, Guojun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27161-3">http://dx.doi.org/10.1007/978-3-319-27161-3</a><br/>Format:&#160;Electronic Resources<br/> Risk Assessment and Risk-Driven Testing Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:23524 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Seehusen, Fredrik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26416-5">http://dx.doi.org/10.1007/978-3-319-26416-5</a><br/>Format:&#160;Electronic Resources<br/> Multiple Access Communications 8th International Workshop, MACOM 2015, Helsinki, Finland, September 3-4, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23291 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Jonsson, Magnus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23440-3">http://dx.doi.org/10.1007/978-3-319-23440-3</a><br/>Format:&#160;Electronic Resources<br/> Ad-hoc Networks and Wireless ADHOC-NOW 2014 International Workshops, ETSD, MARSS, MWaoN, SecAN, SSPA, and WiSARN, Benidorm, Spain, June 22--27, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24722 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Garcia Pineda, Miguel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46338-3">http://dx.doi.org/10.1007/978-3-662-46338-3</a><br/>Format:&#160;Electronic Resources<br/> Privacy in a Digital, Networked World Technologies, Implications and Solutions ent://SD_ILS/0/SD_ILS:21180 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Zeadally, Sherali. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08470-1">http://dx.doi.org/10.1007/978-3-319-08470-1</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Mechanisms for Network Configuration and Security 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23009 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Latr&eacute;, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20034-7">http://dx.doi.org/10.1007/978-3-319-20034-7</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23554 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26961-0">http://dx.doi.org/10.1007/978-3-319-26961-0</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:23559 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Huang, Zhiqiu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27051-7">http://dx.doi.org/10.1007/978-3-319-27051-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:22830 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Bishop, Matt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18500-2">http://dx.doi.org/10.1007/978-3-319-18500-2</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23248 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Fischer-H&uuml;bner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22906-5">http://dx.doi.org/10.1007/978-3-319-22906-5</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Services Sciences International Conference in Cloud Computing and Services Sciences, CLOSER 2014 Barcelona Spain, April 3&ndash;5, 2014 Revised Selected Papers ent://SD_ILS/0/SD_ILS:23449 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Helfert, Markus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25414-2">http://dx.doi.org/10.1007/978-3-319-25414-2</a><br/>Format:&#160;Electronic Resources<br/> Social Computing, Behavioral-Cultural Modeling, and Prediction 8th International Conference, SBP 2015, Washington, DC, USA, March 31-April 3, 2015. Proceedings ent://SD_ILS/0/SD_ILS:22527 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Agarwal, Nitin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16268-3">http://dx.doi.org/10.1007/978-3-319-16268-3</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXIX 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23076 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Samarati, Pierangela. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20810-7">http://dx.doi.org/10.1007/978-3-319-20810-7</a><br/>Format:&#160;Electronic Resources<br/> Internet of Things, Smart Spaces, and Next Generation Networks and Systems 15th International Conference, NEW2AN 2015, and 8th Conference, ruSMART 2015, St. Petersburg, Russia, August 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23265 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Balandin, Sergey. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23126-6">http://dx.doi.org/10.1007/978-3-319-23126-6</a><br/>Format:&#160;Electronic Resources<br/> Software Engineering for Resilient Systems 7th International Workshop, SERENE 2015, Paris, France, September 7-8, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23266 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Fantechi, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23129-7">http://dx.doi.org/10.1007/978-3-319-23129-7</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:22822 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Federrath, Hannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18467-8">http://dx.doi.org/10.1007/978-3-319-18467-8</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23468 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Khouzani, MHR. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25594-1">http://dx.doi.org/10.1007/978-3-319-25594-1</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems -- CHES 2015 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings ent://SD_ILS/0/SD_ILS:24868 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;G&uuml;neysu, Tim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48324-4">http://dx.doi.org/10.1007/978-3-662-48324-4</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23337 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24126-5">http://dx.doi.org/10.1007/978-3-319-24126-5</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings ent://SD_ILS/0/SD_ILS:24765 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Focardi, Riccardo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46666-7">http://dx.doi.org/10.1007/978-3-662-46666-7</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing 13th International Conference, ICSOC 2015, Goa, India, November 16-19, 2015, Proceedings ent://SD_ILS/0/SD_ILS:24880 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Barros, Alistair. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48616-0">http://dx.doi.org/10.1007/978-3-662-48616-0</a><br/>Format:&#160;Electronic Resources<br/> Ad-hoc, Mobile, and Wireless Networks 14th International Conference, ADHOC-NOW 2015, Athens, Greece, June 29 -- July 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:22967 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Papavassiliou, Symeon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19662-6">http://dx.doi.org/10.1007/978-3-319-19662-6</a><br/>Format:&#160;Electronic Resources<br/> Energy Informatics 4th D-A-CH Conference, EI 2015, Karlsruhe, Germany, November 12-13, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23492 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Gottwalt, Sebastian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25876-8">http://dx.doi.org/10.1007/978-3-319-25876-8</a><br/>Format:&#160;Electronic Resources<br/> Testing Software and Systems 27th IFIP WG 6.1 International Conference, ICTSS 2015, Sharjah and Dubai, United Arab Emirates, November 23-25, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23501 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;El-Fakih, Khaled. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25945-1">http://dx.doi.org/10.1007/978-3-319-25945-1</a><br/>Format:&#160;Electronic Resources<br/> Guide to Security Assurance for Cloud Computing ent://SD_ILS/0/SD_ILS:23502 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Zhu, Shao Ying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25988-8">http://dx.doi.org/10.1007/978-3-319-25988-8</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23505 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26096-9">http://dx.doi.org/10.1007/978-3-319-26096-9</a><br/>Format:&#160;Electronic Resources<br/> Globalizing Domain-Specific Languages International Dagstuhl Seminar, Dagstuhl Castle, Germany, October 5-10, 2014, Revised Papers ent://SD_ILS/0/SD_ILS:23512 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Combemale, Benoit. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26172-0">http://dx.doi.org/10.1007/978-3-319-26172-0</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23520 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Bos, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26362-5">http://dx.doi.org/10.1007/978-3-319-26362-5</a><br/>Format:&#160;Electronic Resources<br/> Energy Efficient Data Centers Third International Workshop, E2DC 2014, Cambridge, UK, June 10, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22438 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Klingert, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15786-3">http://dx.doi.org/10.1007/978-3-319-15786-3</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XIX Special Issue on Big Data and Open Data ent://SD_ILS/0/SD_ILS:24750 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46562-2">http://dx.doi.org/10.1007/978-3-662-46562-2</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XX Special Issue on Advanced Techniques for Big Data Management ent://SD_ILS/0/SD_ILS:24771 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46703-9">http://dx.doi.org/10.1007/978-3-662-46703-9</a><br/>Format:&#160;Electronic Resources<br/> Frontiers in Internet Technologies Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24784 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Zhang, Shiyong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46826-5">http://dx.doi.org/10.1007/978-3-662-46826-5</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 17th International Symposium, SSS 2015, Edmonton, AB, Canada, August 18-21, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23158 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Pelc, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21741-3">http://dx.doi.org/10.1007/978-3-319-21741-3</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22640 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17127-2">http://dx.doi.org/10.1007/978-3-319-17127-2</a><br/>Format:&#160;Electronic Resources<br/> Social Computing, Behavioral-Cultural Modeling and Prediction 7th International Conference, SBP 2014, Washington, DC, USA, April 1-4, 2014. Proceedings ent://SD_ILS/0/SD_ILS:20688 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Kennedy, William G. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05579-4">http://dx.doi.org/10.1007/978-3-319-05579-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings ent://SD_ILS/0/SD_ILS:20807 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Huang, Xinyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06320-1">http://dx.doi.org/10.1007/978-3-319-06320-1</a><br/>Format:&#160;Electronic Resources<br/> Internet of Things, Smart Spaces, and Next Generation Networks and Systems 14th International Conference, NEW2AN 2014 and 7th Conference, ruSMART 2014, St. Petersburg, Russia, August 27-29, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21495 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Balandin, Sergey. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10353-2">http://dx.doi.org/10.1007/978-3-319-10353-2</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21922 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Poovendran, Radha. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12601-2">http://dx.doi.org/10.1007/978-3-319-12601-2</a><br/>Format:&#160;Electronic Resources<br/> Ad-hoc, Mobile, and Wireless Networks 13th International Conference, ADHOC-NOW 2014, Benidorm, Spain, June 22-27, 2014 Proceedings ent://SD_ILS/0/SD_ILS:20995 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Guo, Song. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07425-2">http://dx.doi.org/10.1007/978-3-319-07425-2</a><br/>Format:&#160;Electronic Resources<br/> Mathematical and Engineering Methods in Computer Science 9th International Doctoral Workshop, MEMICS 2014, Telč, Czech Republic, October 17--19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22295 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Hliněn&yacute;, Petr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14896-0">http://dx.doi.org/10.1007/978-3-319-14896-0</a><br/>Format:&#160;Electronic Resources<br/> Traffic Monitoring and Analysis 6th International Workshop, TMA 2014, London, UK, April 14, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24075 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Dainotti, Alberto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54999-1">http://dx.doi.org/10.1007/978-3-642-54999-1</a><br/>Format:&#160;Electronic Resources<br/> Energy-Efficient Data Centers Second International Workshop, E&sup2;DC 2013, Berkeley, CA, USA, May 21, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:24100 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Klingert, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55149-9">http://dx.doi.org/10.1007/978-3-642-55149-9</a><br/>Format:&#160;Electronic Resources<br/> Testing Software and Systems 26th IFIP WG 6.1 International Conference, ICTSS 2014, Madrid, Spain, September 23-25, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24568 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Merayo, Mercedes G. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44857-1">http://dx.doi.org/10.1007/978-3-662-44857-1</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24688 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45921-8">http://dx.doi.org/10.1007/978-3-662-45921-8</a><br/>Format:&#160;Electronic Resources<br/> Collaborative Systems for Smart Networked Environments 15th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2014, Amsterdam, The Netherlands, October 6-8, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24549 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Camarinha-Matos, Luis M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44745-1">http://dx.doi.org/10.1007/978-3-662-44745-1</a><br/>Format:&#160;Electronic Resources<br/> Multiple Access Communications 7th International Workshop, MACOM 2014, Halmstad, Sweden, August 27-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21476 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Jonsson, Magnus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10262-7">http://dx.doi.org/10.1007/978-3-319-10262-7</a><br/>Format:&#160;Electronic Resources<br/> System Analysis and Modeling: Models and Reusability 8th International Conference, SAM 2014, Valencia, Spain, September 29-30, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21775 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Amyot, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11743-0">http://dx.doi.org/10.1007/978-3-319-11743-0</a><br/>Format:&#160;Electronic Resources<br/> Software Architecture 8th European Conference, ECSA 2014, Vienna, Austria, August 25-29, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21423 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Avgeriou, Paris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09970-5">http://dx.doi.org/10.1007/978-3-319-09970-5</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing Challenges, Limitations and R&amp;D Solutions ent://SD_ILS/0/SD_ILS:21531 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Mahmood, Zaigham. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10530-7">http://dx.doi.org/10.1007/978-3-319-10530-7</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24122 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Cuppens-Boulahia, Nora. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55415-5">http://dx.doi.org/10.1007/978-3-642-55415-5</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24573 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Decker, Bart De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44885-4">http://dx.doi.org/10.1007/978-3-662-44885-4</a><br/>Format:&#160;Electronic Resources<br/> Wireless Algorithms, Systems, and Applications 9th International Conference, WASA 2014, Harbin, China, June 23-25, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21071 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Cai, Zhipeng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07782-6">http://dx.doi.org/10.1007/978-3-319-07782-6</a><br/>Format:&#160;Electronic Resources<br/> Modelling Foundations and Applications 10th European Conference, ECMFA 2014, Held as Part of STAF 2014, York, UK, July 21-25, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21303 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Cabot, Jordi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09195-2">http://dx.doi.org/10.1007/978-3-319-09195-2</a><br/>Format:&#160;Electronic Resources<br/> Sequences and Their Applications - SETA 2014 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:21884 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Schmidt, Kai-Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12325-7">http://dx.doi.org/10.1007/978-3-319-12325-7</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21841 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12060-7">http://dx.doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions and Defenses 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21695 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Stavrou, Angelos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11379-1">http://dx.doi.org/10.1007/978-3-319-11379-1</a><br/>Format:&#160;Electronic Resources<br/> Trust Management in Cloud Services ent://SD_ILS/0/SD_ILS:21869 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Noor, Talal H. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12250-2">http://dx.doi.org/10.1007/978-3-319-12250-2</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23944 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53997-8">http://dx.doi.org/10.1007/978-3-642-53997-8</a><br/>Format:&#160;Electronic Resources<br/> Monitoring and Securing Virtualized Networks and Services 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 &ndash; July 3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24431 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Sperotto, Anna. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43862-6">http://dx.doi.org/10.1007/978-3-662-43862-6</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:21460 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Prouff, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10175-0">http://dx.doi.org/10.1007/978-3-319-10175-0</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:24044 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Abadi, Mart&iacute;n. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54792-8">http://dx.doi.org/10.1007/978-3-642-54792-8</a><br/>Format:&#160;Electronic Resources<br/> Information Systems and Global Assemblages. (Re)Configuring Actors, Artefacts, Organizations IFIP WG 8.2 Working Conference on Information Systems and Organizations, IS&amp;O 2014, Auckland, New Zealand, December 11-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24671 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Doolin, Bill. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45708-5">http://dx.doi.org/10.1007/978-3-662-45708-5</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing 12th International Conference, ICSOC 2014, Paris, France, November 3-6, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24625 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Franch, Xavier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45391-9">http://dx.doi.org/10.1007/978-3-662-45391-9</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24446 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43936-4">http://dx.doi.org/10.1007/978-3-662-43936-4</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 8th International Conference, NSS 2014, Xi&rsquo;an, China, October 15-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:21766 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Au, Man Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11698-3">http://dx.doi.org/10.1007/978-3-319-11698-3</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21876 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Gritzalis, Dimitris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12280-9">http://dx.doi.org/10.1007/978-3-319-12280-9</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21891 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12400-1">http://dx.doi.org/10.1007/978-3-319-12400-1</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Services Science Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21732 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Helfert, Markus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11561-0">http://dx.doi.org/10.1007/978-3-319-11561-0</a><br/>Format:&#160;Electronic Resources<br/> Economics of Grids, Clouds, Systems, and Services 11th International Conference, GECON 2014, Cardiff, UK, September 16-18, 2014. Revised Selected Papers. ent://SD_ILS/0/SD_ILS:22260 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Altmann, J&ouml;rn. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14609-6">http://dx.doi.org/10.1007/978-3-319-14609-6</a><br/>Format:&#160;Electronic Resources<br/> Web Technologies and Applications APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21640 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Han, Weihong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11119-3">http://dx.doi.org/10.1007/978-3-319-11119-3</a><br/>Format:&#160;Electronic Resources<br/> Internet of Vehicles &ndash; Technologies and Services First International Conference, IOV, Beijing, China, September 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21647 2024-06-29T01:22:29Z 2024-06-29T01:22:29Z Yazar&#160;Hsu, Robert C.-H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11167-4">http://dx.doi.org/10.1007/978-3-319-11167-4</a><br/>Format:&#160;Electronic Resources<br/>