Search Results for - Narrowed by: Computers and Society. - Legal Aspects of Computing.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computers$002band$002bSociety.$002509Computers$002band$002bSociety.$0026qf$003dSUBJECT$002509Konu$002509Legal$002bAspects$002bof$002bComputing.$002509Legal$002bAspects$002bof$002bComputing.$0026ps$003d300$0026isd$003dtrue?2024-06-19T13:44:18ZAdvances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281292024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751<br/><a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4283242024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Electronic Participation 11th IFIP WG 8.5 International Conference, ePart 2019, San Benedetto Del Tronto, Italy, September 2–4, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4284242024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Panagiotopoulos, Panos. editor. (orcid)0000-0001-5408-4842<br/><a href="https://doi.org/10.1007/978-3-030-27397-2">https://doi.org/10.1007/978-3-030-27397-2</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4277782024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17259-6">https://doi.org/10.1007/978-3-030-17259-6</a><br/>Format: Electronic Resources<br/>Electronic Government 18th IFIP WG 8.5 International Conference, EGOV 2019, San Benedetto Del Tronto, Italy, September 2–4, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281422024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Lindgren, Ida. editor. (orcid)0000-0002-4735-8697<br/><a href="https://doi.org/10.1007/978-3-030-27325-5">https://doi.org/10.1007/978-3-030-27325-5</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4287782024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Guo, Fuchun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4290402024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17253-4">https://doi.org/10.1007/978-3-030-17253-4</a><br/>Format: Electronic Resources<br/>Electronic Government and the Information Systems Perspective 8th International Conference, EGOVIS 2019, Linz, Austria, August 26–29, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281522024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Kő, Andrea. editor. (orcid)0000-0003-0023-1143<br/><a href="https://doi.org/10.1007/978-3-030-27523-5">https://doi.org/10.1007/978-3-030-27523-5</a><br/>Format: Electronic Resources<br/>Smart Working, Living and Organising IFIP WG 8.6 International Conference on Transfer and Diffusion of IT, TDIT 2018, Portsmouth, UK, June 25, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4288882024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Elbanna, Amany. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04315-5">https://doi.org/10.1007/978-3-030-04315-5</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2222742024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2215642024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format: Electronic Resources<br/>Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231522024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format: Electronic Resources<br/>Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2216272024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Gruschka, Nils. editor. (orcid)0000-0001-7360-8314<br/><a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2221892024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2223282024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Castiglione, Arcangelo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format: Electronic Resources<br/>Electronic Participation 10th IFIP WG 8.5 International Conference, ePart 2018, Krems, Austria, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2221482024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Edelmann, Noella. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98578-7">https://doi.org/10.1007/978-3-319-98578-7</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2255572024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2255152024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Matoušek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Electronic Government and the Information Systems Perspective 7th International Conference, EGOVIS 2018, Regensburg, Germany, September 3–5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2217132024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Kő, Andrea. editor. (orcid)0000-0003-0023-1143<br/><a href="https://doi.org/10.1007/978-3-319-98349-3">https://doi.org/10.1007/978-3-319-98349-3</a><br/>Format: Electronic Resources<br/>Electronic Government 17th IFIP WG 8.5 International Conference, EGOV 2018, Krems, Austria, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2217142024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Parycek, Peter. editor. (orcid)0000-0003-3242-0475<br/><a href="https://doi.org/10.1007/978-3-319-98690-6">https://doi.org/10.1007/978-3-319-98690-6</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2223872024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2225942024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XIV 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2218202024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99277-8">https://doi.org/10.1007/978-3-319-99277-8</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2218512024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Bailey, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00470-5">https://doi.org/10.1007/978-3-030-00470-5</a><br/>Format: Electronic Resources<br/>Handbook of Mobile Data Privacyent://SD_ILS/0/SD_ILS:2220332024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Gkoulalas-Divanis, Aris. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format: Electronic Resources<br/>Algorithms and Architectures for Parallel Processing 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part IVent://SD_ILS/0/SD_ILS:2224332024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Vaidya, Jaideep. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05063-4">https://doi.org/10.1007/978-3-030-05063-4</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2228082024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2267982024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Kerschbaum, Florian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2246282024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Electronic Resources<br/>Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2249002024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2232492024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 15th International Conference, ICIAR 2018, Póvoa de Varzim, Portugal, June 27–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2248032024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Campilho, Aurélio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93000-8">https://doi.org/10.1007/978-3-319-93000-8</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2248532024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Giuffrida, Cristiano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93411-2">https://doi.org/10.1007/978-3-319-93411-2</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2230962024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Wang, G. Alan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57463-9">https://doi.org/10.1007/978-3-319-57463-9</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2217472024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66402-6">https://doi.org/10.1007/978-3-319-66402-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2216542024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63688-7">https://doi.org/10.1007/978-3-319-63688-7</a><br/>Format: Electronic Resources<br/>Security Protocols XXV 25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2265362024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71075-4">https://doi.org/10.1007/978-3-319-71075-4</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2261082024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Havarneanu, Grigore. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71368-7">https://doi.org/10.1007/978-3-319-71368-7</a><br/>Format: Electronic Resources<br/>Electronic Government and the Information Systems Perspective 6th International Conference, EGOVIS 2017, Lyon, France, August 28-31, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2268132024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Kő, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-319-64248-2">https://doi.org/10.1007/978-3-319-64248-2</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2221782024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72359-4">https://doi.org/10.1007/978-3-319-72359-4</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2261802024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Kiayias, Aggelos. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70972-7">https://doi.org/10.1007/978-3-319-70972-7</a><br/>Format: Electronic Resources<br/>Electronic Participation 9th IFIP WG 8.5 International Conference, ePart 2017, St. Petersburg, Russia, September 4-7, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2266562024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Parycek, Peter. editor. (orcid)0000-0003-3242-0475<br/><a href="https://doi.org/10.1007/978-3-319-64322-9">https://doi.org/10.1007/978-3-319-64322-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2259292024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Kalai, Yael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70500-2">https://doi.org/10.1007/978-3-319-70500-2</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security Third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2237382024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-65548-2">https://doi.org/10.1007/978-3-319-65548-2</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2245082024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Polychronakis, Michalis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60876-1">https://doi.org/10.1007/978-3-319-60876-1</a><br/>Format: Electronic Resources<br/>Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2266732024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Rak, Jacek. editor.<br/><a href="https://doi.org/10.1007/978-3-319-65127-9">https://doi.org/10.1007/978-3-319-65127-9</a><br/>Format: Electronic Resources<br/>Information Systems Security 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2266772024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Shyamasundar, Rudrapatna K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72598-7">https://doi.org/10.1007/978-3-319-72598-7</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2247362024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar De Capitani di Vimercati, Sabrina. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58469-0">https://doi.org/10.1007/978-3-319-58469-0</a><br/>Format: Electronic Resources<br/>Electronic Government 15th IFIP WG 8.5 International Conference, EGOV 2016, Guimarães, Portugal, September 5-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182772024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Scholl, Hans Jochen. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44421-5">http://dx.doi.org/10.1007/978-3-319-44421-5</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedingsent://SD_ILS/0/SD_ILS:181542024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Ranise, Silvio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41483-6">http://dx.doi.org/10.1007/978-3-319-41483-6</a><br/>Format: Electronic Resources<br/>Electronic Participation 8th IFIP WG 8.5 International Conference, ePart 2016, Guimarães, Portugal, September 5-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183102024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Tambouris, Efthimios. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45074-2">http://dx.doi.org/10.1007/978-3-319-45074-2</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection IX 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:235382024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Rice, Mason. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26567-4">http://dx.doi.org/10.1007/978-3-319-26567-4</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:234572024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar James, Joshua I. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25512-5">http://dx.doi.org/10.1007/978-3-319-25512-5</a><br/>Format: Electronic Resources<br/>Electronic Government 14th IFIP WG 8.5 International Conference, EGOV 2015, Thessaloniki, Greece, August 30 -- September 2, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232142024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Tambouris, Efthimios. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22479-4">http://dx.doi.org/10.1007/978-3-319-22479-4</a><br/>Format: Electronic Resources<br/>Reforming European Data Protection Lawent://SD_ILS/0/SD_ILS:254802024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Gutwirth, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-94-017-9385-8">http://dx.doi.org/10.1007/978-94-017-9385-8</a><br/>Format: Electronic Resources<br/>Privacy vs. Securityent://SD_ILS/0/SD_ILS:195462024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Stalla-Bourdillon, Sophie. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6530-9">http://dx.doi.org/10.1007/978-1-4471-6530-9</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:222192024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Gladyshev, Pavel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14289-0">http://dx.doi.org/10.1007/978-3-319-14289-0</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:246212024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Butts, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45355-1">http://dx.doi.org/10.1007/978-3-662-45355-1</a><br/>Format: Electronic Resources<br/>Electronic Government 13th IFIP WG 8.5 International Conference, EGOV 2014, Dublin, Ireland, September 1-3, 2014. Proceedingsent://SD_ILS/0/SD_ILS:244982024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Janssen, Marijn. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44426-9">http://dx.doi.org/10.1007/978-3-662-44426-9</a><br/>Format: Electronic Resources<br/>Foundations of Digital Government Leading and Managing in the Digital Eraent://SD_ILS/0/SD_ILS:237322024-06-19T13:44:18Z2024-06-19T13:44:18ZYazar Veit, Daniel. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38511-7">http://dx.doi.org/10.1007/978-3-642-38511-7</a><br/>Format: Electronic Resources<br/>