Search Results for - Narrowed by: Springer E-Book Collection - Computers and Society. - Management information systems. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Computers$002band$002bSociety.$002509Computers$002band$002bSociety.$0026qf$003dSUBJECT$002509Konu$002509Management$002binformation$002bsystems.$002509Management$002binformation$002bsystems.$0026ps$003d300? 2024-05-14T02:29:01Z Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:428546 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format:&#160;Electronic Resources<br/> Information Literacy in Everyday Life 6th European Conference, ECIL 2018, Oulu, Finland, September 24&ndash;27, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428789 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Kurbanoğlu, Serap. editor.<br/><a href="https://doi.org/10.1007/978-3-030-13472-3">https://doi.org/10.1007/978-3-030-13472-3</a><br/>Format:&#160;Electronic Resources<br/> e-Democracy Toward a New Model of (Inter)active Society ent://SD_ILS/0/SD_ILS:427699 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Ronchi, Alfredo M. author.<br/><a href="https://doi.org/10.1007/978-3-030-01596-1">https://doi.org/10.1007/978-3-030-01596-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18172 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Aspinall, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41763-9">http://dx.doi.org/10.1007/978-3-319-41763-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18085 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40367-0">http://dx.doi.org/10.1007/978-3-319-40367-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18397 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Barthe, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46598-2">http://dx.doi.org/10.1007/978-3-319-46598-2</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:18687 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Clark, Jeremy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53357-4">http://dx.doi.org/10.1007/978-3-662-53357-4</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17413 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29814-6">http://dx.doi.org/10.1007/978-3-319-29814-6</a><br/>Format:&#160;Electronic Resources<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17955 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39028-4">http://dx.doi.org/10.1007/978-3-319-39028-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18073 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40253-6">http://dx.doi.org/10.1007/978-3-319-40253-6</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18379 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18653 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49635-0">http://dx.doi.org/10.1007/978-3-662-49635-0</a><br/>Format:&#160;Electronic Resources<br/> Social Media: The Good, the Bad, and the Ugly 15th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2016, Swansea, UK, September 13&ndash;15, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18315 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Dwivedi, Yogesh K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45234-0">http://dx.doi.org/10.1007/978-3-319-45234-0</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lectures ent://SD_ILS/0/SD_ILS:18231 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-43005-8">http://dx.doi.org/10.1007/978-3-319-43005-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18344 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45741-3">http://dx.doi.org/10.1007/978-3-319-45741-3</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18345 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45744-4">http://dx.doi.org/10.1007/978-3-319-45744-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Network Science 12th International Conference and School, NetSci-X 2016, Wroclaw, Poland, January 11-13, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17246 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Wierzbicki, Adam. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28361-6">http://dx.doi.org/10.1007/978-3-319-28361-6</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7&ndash;9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:17428 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29938-9">http://dx.doi.org/10.1007/978-3-319-29938-9</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17837 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Rome, Erich. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33331-1">http://dx.doi.org/10.1007/978-3-319-33331-1</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:18006 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17239 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Haltinner, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28313-5">http://dx.doi.org/10.1007/978-3-319-28313-5</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government and the Information Systems Perspective 5th International Conference, EGOVIS 2016, Porto, Portugal, September 5-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18264 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Kő, Andrea. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44159-7">http://dx.doi.org/10.1007/978-3-319-44159-7</a><br/>Format:&#160;Electronic Resources<br/> Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21&ndash;22, 2015 Revised Selected Papers ent://SD_ILS/0/SD_ILS:18089 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;B&eacute;cue, Adrien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40385-4">http://dx.doi.org/10.1007/978-3-319-40385-4</a><br/>Format:&#160;Electronic Resources<br/> Provenance and Annotation of Data and Processes 6th International Provenance and Annotation Workshop, IPAW 2016, McLean, VA, USA, June 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18113 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Mattoso, Marta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40593-3">http://dx.doi.org/10.1007/978-3-319-40593-3</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management 14th International Conference, BPM 2016, Rio de Janeiro, Brazil, September 18-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:18322 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;La Rosa, Marcello. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45348-4">http://dx.doi.org/10.1007/978-3-319-45348-4</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18337 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Franz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45572-3">http://dx.doi.org/10.1007/978-3-319-45572-3</a><br/>Format:&#160;Electronic Resources<br/> Green in Software Engineering ent://SD_ILS/0/SD_ILS:21196 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Calero, Coral. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08581-4">http://dx.doi.org/10.1007/978-3-319-08581-4</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:23559 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Huang, Zhiqiu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27051-7">http://dx.doi.org/10.1007/978-3-319-27051-7</a><br/>Format:&#160;Electronic Resources<br/> Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23284 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23276-8">http://dx.doi.org/10.1007/978-3-319-23276-8</a><br/>Format:&#160;Electronic Resources<br/> E-Democracy &ndash; Citizen Rights in the World of the New Computing Paradigms 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23570 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Katsikas, Sokratis K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27164-4">http://dx.doi.org/10.1007/978-3-319-27164-4</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23238 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Conti, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22846-4">http://dx.doi.org/10.1007/978-3-319-22846-4</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23504 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Au, Man-Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26059-4">http://dx.doi.org/10.1007/978-3-319-26059-4</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23182 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Hui, Lucas C. K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21966-0">http://dx.doi.org/10.1007/978-3-319-21966-0</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management 13th International Conference, BPM 2015, Innsbruck, Austria, August 31 -- September 3, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23258 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Motahari-Nezhad, Hamid Reza. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23063-4">http://dx.doi.org/10.1007/978-3-319-23063-4</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:23457 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;James, Joshua I. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25512-5">http://dx.doi.org/10.1007/978-3-319-25512-5</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23471 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Qiu, Meikang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25645-0">http://dx.doi.org/10.1007/978-3-319-25645-0</a><br/>Format:&#160;Electronic Resources<br/> Multiple Access Communications 8th International Workshop, MACOM 2015, Helsinki, Finland, September 3-4, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23291 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Jonsson, Magnus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23440-3">http://dx.doi.org/10.1007/978-3-319-23440-3</a><br/>Format:&#160;Electronic Resources<br/> Product-Focused Software Process Improvement 16th International Conference, PROFES 2015, Bolzano, Italy, December 2-4, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23549 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Abrahamsson, Pekka. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26844-6">http://dx.doi.org/10.1007/978-3-319-26844-6</a><br/>Format:&#160;Electronic Resources<br/> Accountability and Security in the Cloud First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures ent://SD_ILS/0/SD_ILS:22653 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Felici, Massimo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17199-9">http://dx.doi.org/10.1007/978-3-319-17199-9</a><br/>Format:&#160;Electronic Resources<br/> Energy Efficient Data Centers Third International Workshop, E2DC 2014, Cambridge, UK, June 10, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22438 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Klingert, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15786-3">http://dx.doi.org/10.1007/978-3-319-15786-3</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management for the Future Internet in the Age of Globalisation 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22842 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18621-4">http://dx.doi.org/10.1007/978-3-319-18621-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:23342 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Pernul, G&uuml;nther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24174-6">http://dx.doi.org/10.1007/978-3-319-24174-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:23343 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Pernul, G&uuml;nther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24177-7">http://dx.doi.org/10.1007/978-3-319-24177-7</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23344 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Mj&oslash;lsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24192-0">http://dx.doi.org/10.1007/978-3-319-24192-0</a><br/>Format:&#160;Electronic Resources<br/> Social Computing, Behavioral-Cultural Modeling, and Prediction 8th International Conference, SBP 2015, Washington, DC, USA, March 31-April 3, 2015. Proceedings ent://SD_ILS/0/SD_ILS:22527 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Agarwal, Nitin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16268-3">http://dx.doi.org/10.1007/978-3-319-16268-3</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing - ICSOC 2014 Workshops WESOA; SeMaPS, RMSOC, KASA, ISC, FOR-MOVES, CCSA and Satellite Events, Paris, France, November 3-6, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23245 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Toumani, Farouk. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22885-3">http://dx.doi.org/10.1007/978-3-319-22885-3</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security and Privacy First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23592 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Camp, Olivier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27668-7">http://dx.doi.org/10.1007/978-3-319-27668-7</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23614 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings ent://SD_ILS/0/SD_ILS:24765 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Focardi, Riccardo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46666-7">http://dx.doi.org/10.1007/978-3-662-46666-7</a><br/>Format:&#160;Electronic Resources<br/> Advanced Concepts for Intelligent Vision Systems 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23496 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Battiato, Sebastiano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25903-1">http://dx.doi.org/10.1007/978-3-319-25903-1</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection IX 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23538 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Rice, Mason. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26567-4">http://dx.doi.org/10.1007/978-3-319-26567-4</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23400 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24858-5">http://dx.doi.org/10.1007/978-3-319-24858-5</a><br/>Format:&#160;Electronic Resources<br/> Provenance and Annotation of Data and Processes 5th International Provenance and Annotation Workshop, IPAW 2014, Cologne, Germany, June 9-13, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:22551 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Lud&auml;scher, Bertram. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16462-5">http://dx.doi.org/10.1007/978-3-319-16462-5</a><br/>Format:&#160;Electronic Resources<br/> Traffic Monitoring and Analysis 7th International Workshop, TMA 2015, Barcelona, Spain, April 21-24, 2015. Proceedings ent://SD_ILS/0/SD_ILS:22648 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Steiner, Moritz. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17172-2">http://dx.doi.org/10.1007/978-3-319-17172-2</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21185 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Cristofaro, Emiliano De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08506-7">http://dx.doi.org/10.1007/978-3-319-08506-7</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 &ndash; July 2, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21199 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Holz, Thorsten. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08593-7">http://dx.doi.org/10.1007/978-3-319-08593-7</a><br/>Format:&#160;Electronic Resources<br/> Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21491 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10329-7">http://dx.doi.org/10.1007/978-3-319-10329-7</a><br/>Format:&#160;Electronic Resources<br/> E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:21769 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Sideridis, Alexander B. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11710-2">http://dx.doi.org/10.1007/978-3-319-11710-2</a><br/>Format:&#160;Electronic Resources<br/> Sociomaterial-Design Bounding Technologies in Practice ent://SD_ILS/0/SD_ILS:21924 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Bj&oslash;rn, Pernille. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12607-4">http://dx.doi.org/10.1007/978-3-319-12607-4</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:22219 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Gladyshev, Pavel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14289-0">http://dx.doi.org/10.1007/978-3-319-14289-0</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21902 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Chow, Sherman S. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12475-9">http://dx.doi.org/10.1007/978-3-319-12475-9</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24097 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Hansen, Marit. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55137-6">http://dx.doi.org/10.1007/978-3-642-55137-6</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:23944 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53997-8">http://dx.doi.org/10.1007/978-3-642-53997-8</a><br/>Format:&#160;Electronic Resources<br/> Creating Value for All Through IT IFIP WG 8.6 International Conference on Transfer and Diffusion of IT, TDIT 2014, Aalborg, Denmark, June 2-4, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24396 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Bergvall-K&aring;reborn, Birgitta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43459-8">http://dx.doi.org/10.1007/978-3-662-43459-8</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:24621 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Butts, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45355-1">http://dx.doi.org/10.1007/978-3-662-45355-1</a><br/>Format:&#160;Electronic Resources<br/> Social Computing, Behavioral-Cultural Modeling and Prediction 7th International Conference, SBP 2014, Washington, DC, USA, April 1-4, 2014. Proceedings ent://SD_ILS/0/SD_ILS:20688 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Kennedy, William G. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05579-4">http://dx.doi.org/10.1007/978-3-319-05579-4</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:20448 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Padr&oacute;, Carles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04268-8">http://dx.doi.org/10.1007/978-3-319-04268-8</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Digital Government Leading and Managing in the Digital Era ent://SD_ILS/0/SD_ILS:23732 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Veit, Daniel. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38511-7">http://dx.doi.org/10.1007/978-3-642-38511-7</a><br/>Format:&#160;Electronic Resources<br/> ICT and Society 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 &ndash; August 1, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24476 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Kimppa, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44208-1">http://dx.doi.org/10.1007/978-3-662-44208-1</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:21460 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Prouff, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10175-0">http://dx.doi.org/10.1007/978-3-319-10175-0</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government and the Information Systems Perspective Third International Conference, EGOVIS 2014, Munich, Germany, September 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21461 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Kő, Andrea. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10178-1">http://dx.doi.org/10.1007/978-3-319-10178-1</a><br/>Format:&#160;Electronic Resources<br/> Multiple Access Communications 7th International Workshop, MACOM 2014, Halmstad, Sweden, August 27-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21476 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Jonsson, Magnus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10262-7">http://dx.doi.org/10.1007/978-3-319-10262-7</a><br/>Format:&#160;Electronic Resources<br/> Product-Focused Software Process Improvement 15th International Conference, PROFES 2014, Helsinki, Finland, December 10-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:22154 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Jedlitschka, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13835-0">http://dx.doi.org/10.1007/978-3-319-13835-0</a><br/>Format:&#160;Electronic Resources<br/> Information Systems and Global Assemblages. (Re)Configuring Actors, Artefacts, Organizations IFIP WG 8.2 Working Conference on Information Systems and Organizations, IS&amp;O 2014, Auckland, New Zealand, December 11-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24671 2024-05-14T02:29:01Z 2024-05-14T02:29:01Z Yazar&#160;Doolin, Bill. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45708-5">http://dx.doi.org/10.1007/978-3-662-45708-5</a><br/>Format:&#160;Electronic Resources<br/>