141
Applied Cryptography and Network Security [E-Book] : 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings /
142
Public Key Cryptography – PKC 2009 [E-Book] : 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings /
143
Requirements Engineering: Foundation for Software Quality [E-Book] : 16th International Working Conference, REFSQ 2010, Essen, Germany, June 30–July 2, 2010. Proceedings /
144
Algorithmic Aspects in Information and Management [E-Book] : 6th International Conference, AAIM 2010, Weihai, China, July 19-21, 2010. Proceedings /
145
Information, Security and Cryptology – ICISC 2009 [E-Book] : 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers /
146
Trusted Systems [E-Book] : First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers /
147
Critical Information Infrastructures Security [E-Book] : 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papers /
148
Testing Techniques in Software Engineering [E-Book] : Second Pernambuco Summer School on Software Engineering, PSSE 2007, Recife, Brazil, December 3-7, 2007, Revised Lectures /
149
Advanced Lectures on Software Engineering [E-Book] : LASER Summer School 2007/2008 /
150
Public Key Cryptography – PKC 2010 [E-Book] : 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings /
151
NETWORKING 2010 [E-Book] : 9th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010. Proceedings /
152
Information Security, Practice and Experience [E-Book] : 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings /
153
Progress in Cryptology – AFRICACRYPT 2010 [E-Book] : Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings /
154
Distributed Applications and Interoperable Systems [E-Book] : 9th IFIP WG 6.1 International Conference, DAIS 2009, Lisbon, Portugal, June 9-11, 2009. Proceedings /
155
Progress in Cryptology – AFRICACRYPT 2009 [E-Book] : Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings /
156
Theory and Practice of Model Transformations [E-Book] : Second International Conference, ICMT 2009, Zurich, Switzerland, June 29-30, 2009. Proceedings /
157
Next-Generation Applied Intelligence [E-Book] : 22nd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2009, Tainan, Taiwan, June 24-27, 2009. Proceedings /
158
Information Security and Privacy [E-Book] : 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings /
159
Information Security [E-Book] : 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings /
160
UML 2003 -- The Unified Modeling Language, Modeling Languages and Applications [E-Book] : 6th International Conference San Francisco, CA, USA, October 20-24, 2003, Proceedings /