E-Business and Telecommunications [E-Book] : 18th International Conference, ICETE 2021, Virtual Event, July 6-9, 2021, Revised Selected Papers / edited by Pierangela Samarati, Marten van Sinderen, Sabrina De Capitani di Vimercati, Fons Wijnhoven.
The present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021. The 17 full papers included in thi...
Saved in:
Full text |
|
Personal Name(s): | Samarati, Pierangela, editor |
Vimercati, Sabrina De Capitani di, editor / Wijnhoven, Fons, editor / van Sinderen, Marten, editor | |
Edition: |
1st edition 2023. |
Imprint: |
Cham :
Springer,
2023
|
Physical Description: |
XIV, 412 pages 125 illustrations, 74 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9783031368400 |
DOI: |
10.1007/978-3-031-36840-0 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Communications in Computer and Information Science ;
1795 |
Subject (LOC): |
- e-Business
- The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions
- An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective
- Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices
- Improved Protection of User Data through the Use of a Traceable Anonymous One Time Password
- Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment
- Digital Transformation and Management of Transfer in University Platforms
- A Method for Bottleneck Detection, Prediction, and Recommendation using Process Mining Techniques
- Security and Cryptography
- A Classification of Software-architectural Uncertainty regarding Confidentiality
- Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications
- Improving Time Complexity and Utility of k-anonymous Microaggregation
- Extended Formal Analysis of the EDHOC Protocol in Tamarin
- Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies
- Evaluating Defensive Countermeasures for Software-based Hardware Abstraction
- Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics
- On Applying Boolean Masking to Exponents
- Trusted Implementation and Enforcement of Application-specific Security Policies
- Selective Encryption for Owners' Control in Digital Data Markets.