Search Results for Data structures (Computer science) - Narrowed by: SpringerLink (Online service) - Computer network architectures. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bstructures$002b$002528Computer$002bscience$002529$0026qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetwork$002barchitectures.$002509Computer$002bnetwork$002barchitectures.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?dt=list 2024-07-14T13:34:30Z Guide to Cloud Computing Principles and Practice ent://SD_ILS/0/SD_ILS:331022 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Hill, Richard. author.&#160;Hirsch, Laurie. author.&#160;Lake, Peter. author.&#160;Moshiri, Siavash. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331022.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4603-2">http://dx.doi.org/10.1007/978-1-4471-4603-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modern Cryptography Primer Theoretical Foundations and Practical Applications ent://SD_ILS/0/SD_ILS:335099 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Ko&#347;cielny, Czes&#322;aw. author.&#160;Kurkowski, Miros&#322;aw. author.&#160;Srebrny, Marian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335099.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Real-Time In-Memory Discovery Service Leveraging Hierarchical Packaging Information in a Unique Identifier Network to Retrieve Track and Trace Information ent://SD_ILS/0/SD_ILS:334366 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;M&uuml;ller, J&uuml;rgen. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334366.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37128-8">http://dx.doi.org/10.1007/978-3-642-37128-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Economics of Information Security and Privacy III ent://SD_ILS/0/SD_ILS:331294 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Schneier, Bruce. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331294.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Protocol Security Analysis Based on Trusted Freshness ent://SD_ILS/0/SD_ILS:195536 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Dong, Ling. author.&#160;Chen, Kefei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-24073-7">http://dx.doi.org/10.1007/978-3-642-24073-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering Secure Two-Party Computation Protocols Design, Optimization, and Applications of Efficient Secure Function Evaluation ent://SD_ILS/0/SD_ILS:196819 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Schneider, Thomas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30042-4">http://dx.doi.org/10.1007/978-3-642-30042-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunications International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197636 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Obaidat, Mohammad S. editor.&#160;Sevillano, Jos&eacute; L. editor.&#160;Filipe, Joaquim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35755-8">http://dx.doi.org/10.1007/978-3-642-35755-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Operational Semantics and Verification of Security Protocols ent://SD_ILS/0/SD_ILS:188195 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Cremers, Cas. author.&#160;Mauw, Sjouke. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78636-8">http://dx.doi.org/10.1007/978-3-540-78636-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Spyware and Adware ent://SD_ILS/0/SD_ILS:167516 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Aycock, John. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195249 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Kim, Tai-hoon. editor.&#160;Adeli, Hojjat. editor.&#160;Robles, Rosslin John. editor.&#160;Balitanas, Maricel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23141-4">http://dx.doi.org/10.1007/978-3-642-23141-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Informatics and Communication International Conference, ICAIC 2011,Xi&rsquo;an, China, August 20-21, 2011, Proceedings, Part I ent://SD_ILS/0/SD_ILS:195274 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Zeng, Dehuai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23214-5">http://dx.doi.org/10.1007/978-3-642-23214-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Informatics and Communication International Conference, ICAIC 2011, Xi&rsquo;an, China, August 20-21, 2011, Proceedings, Part II ent://SD_ILS/0/SD_ILS:195276 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Zeng, Dehuai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23220-6">http://dx.doi.org/10.1007/978-3-642-23220-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Informatics and Communication International Conference, ICAIC 2011, Xi&rsquo;an, China, August 20-21, 2011, Proceedings, Part V ent://SD_ILS/0/SD_ILS:195277 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Zhang, Jun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23223-7">http://dx.doi.org/10.1007/978-3-642-23223-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Informatics and Communication International Conference, ICAIC 2011, Xi&rsquo;an, China, August 20-21, 2011, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:195278 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Zhang, Jun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23226-8">http://dx.doi.org/10.1007/978-3-642-23226-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Informatics and Communication International Conference, ICAIC 2011, Xi&rsquo;ian, China, August 20-21, 2011. Proceedings, Part III ent://SD_ILS/0/SD_ILS:195281 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Zhang, Jianwei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23235-0">http://dx.doi.org/10.1007/978-3-642-23235-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Production Grids in Asia Applications, Developments and Global Ties ent://SD_ILS/0/SD_ILS:171851 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Lin, Simon C. editor.&#160;Yen, Eric. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-0046-3">http://dx.doi.org/10.1007/978-1-4419-0046-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider Threats in Cyber Security ent://SD_ILS/0/SD_ILS:172782 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Probst, Christian W. editor.&#160;Hunker, Jeffrey. editor.&#160;Gollmann, Dieter. editor.&#160;Bishop, Matt. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Grids and Service-Oriented Architectures for Service Level Agreements ent://SD_ILS/0/SD_ILS:172840 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Wieder, Philipp. editor.&#160;Yahyapour, Ramin. editor.&#160;Ziegler, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-7320-7">http://dx.doi.org/10.1007/978-1-4419-7320-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ad Hoc Networks First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:191780 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Zheng, Jun. editor.&#160;Mao, Shiwen. editor.&#160;Midkiff, Scott F. editor.&#160;Zhu, Hua. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11723-7">http://dx.doi.org/10.1007/978-3-642-11723-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Situational Awareness Issues and Research ent://SD_ILS/0/SD_ILS:171874 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Jajodia, Sushil. editor.&#160;Liu, Peng. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Economics of Information Security and Privacy ent://SD_ILS/0/SD_ILS:172736 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Moore, Tyler. editor.&#160;Pym, David. editor.&#160;Ioannidis, Christos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-6967-5">http://dx.doi.org/10.1007/978-1-4419-6967-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Signatures ent://SD_ILS/0/SD_ILS:165432 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Katz, Jonathan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-27712-7">http://dx.doi.org/10.1007/978-0-387-27712-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191712 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Gu, Qijun. editor.&#160;Zang, Wanyu. editor.&#160;Yu, Meng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11526-4">http://dx.doi.org/10.1007/978-3-642-11526-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global Initiatives to Secure Cyberspace An Emerging Landscape ent://SD_ILS/0/SD_ILS:164783 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Portnoy, Michael. editor.&#160;Goodman, Seymour. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09764-0">http://dx.doi.org/10.1007/978-0-387-09764-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Computing, Computer Science, and Advanced Communication First International Conference on Future Computer and Communication, FCC 2009, Wuhan, China, June 6-7, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190294 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Qi, Luo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02342-2">http://dx.doi.org/10.1007/978-3-642-02342-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global Security, Safety, and Sustainability 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190823 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Jahankhani, Hamid. editor.&#160;Hessami, Ali G. editor.&#160;Hsu, Feng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04062-7">http://dx.doi.org/10.1007/978-3-642-04062-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191439 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Jaatun, Martin Gilje. editor.&#160;Zhao, Gansen. editor.&#160;Rong, Chunming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10665-1">http://dx.doi.org/10.1007/978-3-642-10665-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Il futuro dell&rsquo;Information &amp; Communication Technology Tecnologie, timori e scenari futuri della &laquo;global network revolution&raquo; ent://SD_ILS/0/SD_ILS:204401 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Teti, Antonio. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-88-470-1388-9">http://dx.doi.org/10.1007/978-88-470-1388-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Les virus informatiques: th&eacute;orie, pratique et applications ent://SD_ILS/0/SD_ILS:176476 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Filiol, &Eacute;ric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-2-287-98240-8">http://dx.doi.org/10.1007/978-2-287-98240-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information Security and Assurance Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190377 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Park, Jong Hyuk. editor.&#160;Chen, Hsiao-Hwa. editor.&#160;Atiquzzaman, Mohammed. editor.&#160;Lee, Changhoon. editor.&#160;Kim, Tai-hoon. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02617-1">http://dx.doi.org/10.1007/978-3-642-02617-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information Security and Its Application Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190382 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Park, Jong Hyuk. editor.&#160;Zhan, Justin. editor.&#160;Lee, Changhoon. editor.&#160;Wang, Guilin. editor.&#160;Kim, Tai-hoon. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02633-1">http://dx.doi.org/10.1007/978-3-642-02633-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algorithms - ESA 2009 17th Annual European Symposium, Copenhagen, Denmark, September 7-9, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190844 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Fiat, Amos. editor.&#160;Sanders, Peter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04128-0">http://dx.doi.org/10.1007/978-3-642-04128-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Personal Satellite Services International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190890 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Sithamparanathan, Kandeepan. editor.&#160;Marchese, Mario. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04260-7">http://dx.doi.org/10.1007/978-3-642-04260-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Technology International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191494 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;&#346;l&#281;zak, Dominik. editor.&#160;Kim, Tai-hoon. editor.&#160;Fang, Wai-Chi. editor.&#160;Arnett, Kirk P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10847-1">http://dx.doi.org/10.1007/978-3-642-10847-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Multi-Party Non-Repudiation Protocols and Applications ent://SD_ILS/0/SD_ILS:167284 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Onieva, Jos&eacute; A. author.&#160;Lopez, Javier. author.&#160;Zhou, Jianying. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-75630-1">http://dx.doi.org/10.1007/978-0-387-75630-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Grid Computing International Symposium on Grid Computing (ISGC 2007) ent://SD_ILS/0/SD_ILS:167581 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Lin, Simon C. editor.&#160;Yen, Eric. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-78417-5">http://dx.doi.org/10.1007/978-0-387-78417-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190947 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Schmidt, Andreas U. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04434-2">http://dx.doi.org/10.1007/978-3-642-04434-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190634 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Degano, Pierpaolo. editor.&#160;Vigan&ograve;, Luca. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03459-6">http://dx.doi.org/10.1007/978-3-642-03459-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Communication and Networking Second International Conference on Future Generation Communication and Networking, FGCN 2008, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:191309 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Kim, Tai-hoon. editor.&#160;Yang, Laurence T. editor.&#160;Park, Jong Hyuk. editor.&#160;Chang, Alan Chin-Chen. editor.&#160;Vasilakos, Thanos. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10236-3">http://dx.doi.org/10.1007/978-3-642-10236-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection Systems ent://SD_ILS/0/SD_ILS:167451 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Mancini, Luigi V. editor.&#160;Pietro, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and Parallel Computing IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188995 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Cao, Jian. editor.&#160;Li, Minglu. editor.&#160;Wu, Min-You. editor.&#160;Chen, Jinjun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88140-7">http://dx.doi.org/10.1007/978-3-540-88140-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Business and Telecommunication Networks Third International Conference, ICETE 2006, Set&uacute;bal, Portugal, August 7-10, 2006. Selected Papers ent://SD_ILS/0/SD_ILS:186034 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Filipe, Joaquim. editor.&#160;Obaidat, Mohammad S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70760-8">http://dx.doi.org/10.1007/978-3-540-70760-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Vulnerability Analysis and Defense for the Internet ent://SD_ILS/0/SD_ILS:167162 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Singh, Abhishek. editor.&#160;Singh, Baibhav. editor.&#160;Joseph, Hirosh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Grid Middleware and Services Challenges and Solutions ent://SD_ILS/0/SD_ILS:167585 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Talia, Domenico. author.&#160;Yahyapour, Ramin. author.&#160;Ziegler, Wolfgang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-78446-5">http://dx.doi.org/10.1007/978-0-387-78446-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider Attack and Cyber Security Beyond the Hacker ent://SD_ILS/0/SD_ILS:167459 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Stolfo, Salvatore J. editor.&#160;Bellovin, Steven M. editor.&#160;Keromytis, Angelos D. editor.&#160;Hershkop, Shlomo. editor.&#160;Smith, Sean W. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> From Grids to Service and Pervasive Computing ent://SD_ILS/0/SD_ILS:164648 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Priol, Thierry. editor.&#160;Vanneschi, Marco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09455-7">http://dx.doi.org/10.1007/978-0-387-09455-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Grid Computing Achievements and Prospects ent://SD_ILS/0/SD_ILS:164649 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Gorlatch, Sergei. editor.&#160;Fragopoulou, Paraskevi. editor.&#160;Priol, Thierry. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09457-1">http://dx.doi.org/10.1007/978-0-387-09457-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Achievements in European Research on Grid Systems CoreGRID Integration Workshop 2006 (Selected Papers) ent://SD_ILS/0/SD_ILS:166988 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Gorlatch, Sergei. editor.&#160;Bubak, Marian. editor.&#160;Priol, Thierry. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-72812-4">http://dx.doi.org/10.1007/978-0-387-72812-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:166922 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Mayes, Keith E. author.&#160;Markantonakis, Konstantinos. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Telecommunications Networks ent://SD_ILS/0/SD_ILS:166945 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Traynor, Patrick. author.&#160;McDaniel, Patrick. author.&#160;Porta, Thomas La. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Making Grids Work Proceedings of the CoreGRID Workshop on Programming Models Grid and P2P System Architecture Grid Systems, Tools and Environments 12-13 June 2007, Heraklion, Crete, Greece ent://SD_ILS/0/SD_ILS:167586 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Danelutto, Marco. author.&#160;Fragopoulou, Paraskevi. author.&#160;Getov, Vladimir. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-78448-9">http://dx.doi.org/10.1007/978-0-387-78448-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Botnet Detection Countering the Largest Security Threat ent://SD_ILS/0/SD_ILS:166626 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Lee, Wenke. editor.&#160;Wang, Cliff. editor.&#160;Dagon, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network-Aware Security for Group Communications ent://SD_ILS/0/SD_ILS:166640 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Sun, Yan. author.&#160;Trappe, Wade. author.&#160;Liu, K. J. R. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68848-0">http://dx.doi.org/10.1007/978-0-387-68848-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security Policies and Procedures ent://SD_ILS/0/SD_ILS:166393 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Frye, Douglas W. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Synchronizing Internet Protocol Security (SIPSec) ent://SD_ILS/0/SD_ILS:166600 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Shoniregun, Charles A. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy-Respecting Intrusion Detection ent://SD_ILS/0/SD_ILS:166560 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Flegel, Ulrich. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Techniques virales avanc&eacute;es ent://SD_ILS/0/SD_ILS:176382 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Filiol, &Eacute;ric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-2-287-33888-5">http://dx.doi.org/10.1007/978-2-287-33888-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Malware Detection ent://SD_ILS/0/SD_ILS:166294 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Christodorescu, Mihai. editor.&#160;Jha, Somesh. editor.&#160;Maughan, Douglas. editor.&#160;Song, Dawn. editor.&#160;Wang, Cliff. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Knowledge and Data Management in GRIDs ent://SD_ILS/0/SD_ILS:166218 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Talia, Domenico. editor.&#160;Bilas, Angelos. editor.&#160;Dikaiakos, Marios D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-37831-2">http://dx.doi.org/10.1007/978-0-387-37831-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks ent://SD_ILS/0/SD_ILS:166337 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Poovendran, Radha. editor.&#160;Roy, Sumit. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Integrated Research in GRID Computing CoreGRID Integration Workshop 2005 (Selected Papers) November 28&ndash;30, Pisa, Italy ent://SD_ILS/0/SD_ILS:166380 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Gorlatch, Sergei. editor.&#160;Danelutto, Marco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-47658-2">http://dx.doi.org/10.1007/978-0-387-47658-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:166353 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Liu, Donggang. author.&#160;Ning, Peng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers ent://SD_ILS/0/SD_ILS:187555 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Filipe, Joaquim. editor.&#160;Coelhas, Helder. editor.&#160;Saramago, Monica. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75993-5">http://dx.doi.org/10.1007/978-3-540-75993-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Towards Next Generation Grids Proceedings of the CoreGRID Symposium 2007 ent://SD_ILS/0/SD_ILS:166952 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Priol, Thierry. editor.&#160;Vanneschi, Marco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-72498-0">http://dx.doi.org/10.1007/978-0-387-72498-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical Internet Security ent://SD_ILS/0/SD_ILS:165679 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Vacca, John R. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-29844-3">http://dx.doi.org/10.1007/978-0-387-29844-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Classical Introduction to Cryptography Applications for Communications Security ent://SD_ILS/0/SD_ILS:165205 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Vaudenay, Serge. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Developing Ambient Intelligence Proceedings of the First International Conference on Ambient Intelligence Developments (AmID&rsquo;06) ent://SD_ILS/0/SD_ILS:176400 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Ma&ntilde;a, Antonio. author.&#160;Lotz, Volkmar. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-2-287-47610-5">http://dx.doi.org/10.1007/978-2-287-47610-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Classical Introduction to Cryptography Exercise Book ent://SD_ILS/0/SD_ILS:165571 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Baig&egrave;neres, Thomas. author.&#160;Lu, Yi. author.&#160;Vaudenay, Serge. author.&#160;Junod, Pascal. author.&#160;Monnerat, Jean. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hop Integrity in the Internet ent://SD_ILS/0/SD_ILS:165645 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Huang, Chin-Tser. author.&#160;Gouda, Mohamed G. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CryptoGraphics Exploiting Graphics Cards for Security ent://SD_ILS/0/SD_ILS:166011 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Cook, Debra L. author.&#160;Keromytis, Angelos D. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Wireless Network Security ent://SD_ILS/0/SD_ILS:165680 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Vacca, John R. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics for International Security Information Sharing and Data Mining ent://SD_ILS/0/SD_ILS:165714 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Chen, Hsinchun. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-30332-4">http://dx.doi.org/10.1007/0-387-30332-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13&ndash;16, 2005 ent://SD_ILS/0/SD_ILS:165794 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Pollitt, Mark. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-31163-7">http://dx.doi.org/10.1007/0-387-31163-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Austin Protocol Compiler ent://SD_ILS/0/SD_ILS:164876 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;McGuire, Tommy M. author.&#160;Gouda, Mohamed G. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101038">http://dx.doi.org/10.1007/b101038</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Component Models and Systems for Grid Applications Proceedings of the Workshop on Component Models and Systems for Grid Applications held June 26, 2004 in Saint Malo, France. ent://SD_ILS/0/SD_ILS:164906 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Getov, Vladimir. editor.&#160;Kielmann, Thilo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101333">http://dx.doi.org/10.1007/b101333</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Group Communications over Data Networks ent://SD_ILS/0/SD_ILS:164839 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Zou, Xukai. author.&#160;Ramamurthy, Byrav. author.&#160;Magliveras, Spyros S. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b100182">http://dx.doi.org/10.1007/b100182</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Certification and Security in Inter-Organizational E-Service ent://SD_ILS/0/SD_ILS:165086 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Nardelli, Enrico. editor.&#160;Talamo, Maurizio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11397427">http://dx.doi.org/10.1007/11397427</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Parallel and Distributed Computing: Applications and Technologies 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004. Proceedings ent://SD_ILS/0/SD_ILS:182331 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Liew, Kim-Meow. editor.&#160;Shen, Hong. editor.&#160;See, Simon. editor.&#160;Cai, Wentong. editor.&#160;Fan, Pingzhi. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b103538">http://dx.doi.org/10.1007/b103538</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia Encryption and Watermarking ent://SD_ILS/0/SD_ILS:165226 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Furht, Borko. author.&#160;Muharemagic, Edin. author.&#160;Socek, Daniel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136785">http://dx.doi.org/10.1007/b136785</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES) ent://SD_ILS/0/SD_ILS:165267 2024-07-14T13:34:30Z 2024-07-14T13:34:30Z Author&#160;Shoniregun, Charles A. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>