| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996546843903316 |
|
|
Titolo |
E-Business and Telecommunications [[electronic resource] ] : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, Revised Selected Papers / / edited by Pierangela Samarati, Marten van Sinderen, Sabrina De Capitani di Vimercati, Fons Wijnhoven |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2023.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (422 pages) |
|
|
|
|
|
|
Collana |
|
Communications in Computer and Information Science, , 1865-0937 ; ; 1795 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks |
Application software |
Data protection |
Computer networks - Security measures |
Cryptography |
Data encryption (Computer science) |
Computer systems |
Computer Communication Networks |
Computer and Information Systems Applications |
Data and Information Security |
Mobile and Network Security |
Cryptology |
Computer System Implementation |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
e-Business -- The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions -- An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective -- Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices -- Improved Protection of User Data through the Use of a Traceable Anonymous One Time Password -- Gamified Self-paced E-Learning: Two Iterations of an |
|
|
|
|
|
|
|
|
|
|
|
Educational Design Experiment -- Digital Transformation and Management of Transfer in University Platforms -- A Method for Bottleneck Detection, Prediction, and Recommendation using Process Mining Techniques -- Security and Cryptography -- A Classification of Software-architectural Uncertainty regarding Confidentiality -- Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications -- Improving Time Complexity and Utility of k-anonymous Microaggregation -- Extended Formal Analysis of the EDHOC Protocol in Tamarin -- Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies -- Evaluating Defensive Countermeasures for Software-based Hardware Abstraction -- Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics -- On Applying Boolean Masking to Exponents -- Trusted Implementation and Enforcement of Application-specific Security Policies -- Selective Encryption for Owners' Control in Digital Data Markets. |
|
|
|
|
|
|
Sommario/riassunto |
|
The present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021. The 17 full papers included in this book were carefully reviewed and selected from 197 submissions. They were organized in topical sections as follows: e-Business and security and cryptography. |
|
|
|
|
|
|
|
| |