|
![]() |
|||
|
||||
OverviewThe present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021. The 17 full papers included in this book were carefully reviewed and selected from 197 submissions. They were organized in topical sections as follows: e-Business and security and cryptography. Full Product DetailsAuthor: Pierangela Samarati , Marten van Sinderen , Sabrina De Capitani di Vimercati , Fons WijnhovenPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: 1st ed. 2023 Volume: 1795 Weight: 0.652kg ISBN: 9783031368394ISBN 10: 3031368398 Pages: 412 Publication Date: 22 July 2023 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of Contentse-Business.- The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions.- An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective.- Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices.- Improved Protection of User Data through the Use of a Traceable Anonymous One Time Password.- Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment.- Digital Transformation and Management of Transfer in University Platforms.- A Method for Bottleneck Detection, Prediction, and Recommendation using Process Mining Techniques.- Security and Cryptography.- A Classification of Software-architectural Uncertainty regarding Confidentiality.- Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications.- Improving Time Complexity and Utility of k-anonymous Microaggregation.- Extended Formal Analysis of the EDHOC Protocol in Tamarin.- Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies.- Evaluating Defensive Countermeasures for Software-based Hardware Abstraction.- Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics.- On Applying Boolean Masking to Exponents.- Trusted Implementation and Enforcement of Application-specific Security Policies.- Selective Encryption for Owners' Control in Digital Data Markets.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |