04700nam 22007695 450 991073578950332120251113195109.03-031-36840-110.1007/978-3-031-36840-0(MiAaPQ)EBC30661724(Au-PeEL)EBL30661724(DE-He213)978-3-031-36840-0(PPN)272251283(CKB)27757818500041(EXLCZ)992775781850004120230721d2023 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierE-Business and Telecommunications 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, Revised Selected Papers /edited by Pierangela Samarati, Marten van Sinderen, Sabrina De Capitani di Vimercati, Fons Wijnhoven1st ed. 2023.Cham :Springer Nature Switzerland :Imprint: Springer,2023.1 online resource (422 pages)Communications in Computer and Information Science,1865-0937 ;1795Print version: Samarati, Pierangela E-Business and Telecommunications Cham : Springer,c2023 9783031368394 Includes bibliographical references and index.e-Business -- The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions -- An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective -- Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices -- Improved Protection of User Data through the Use of a Traceable Anonymous One Time Password -- Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment -- Digital Transformation and Management of Transfer in University Platforms -- A Method for Bottleneck Detection, Prediction, and Recommendation using Process Mining Techniques -- Security and Cryptography -- A Classification of Software-architectural Uncertainty regarding Confidentiality -- Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications -- Improving Time Complexity andUtility of k-anonymous Microaggregation -- Extended Formal Analysis of the EDHOC Protocol in Tamarin -- Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies -- Evaluating Defensive Countermeasures for Software-based Hardware Abstraction -- Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics -- On Applying Boolean Masking to Exponents -- Trusted Implementation and Enforcement of Application-specific Security Policies -- Selective Encryption for Owners' Control in Digital Data Markets.The present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021. The 17 full papers included in this book were carefully reviewed and selected from 197 submissions. They were organized in topical sections as follows: e-Business and security and cryptography.Communications in Computer and Information Science,1865-0937 ;1795Computer networksApplication softwareData protectionComputer networksSecurity measuresCryptographyData encryption (Computer science)Computer systemsComputer Communication NetworksComputer and Information Systems ApplicationsData and Information SecurityMobile and Network SecurityCryptologyComputer System ImplementationComputer networks.Application software.Data protection.Computer networksSecurity measures.Cryptography.Data encryption (Computer science)Computer systems.Computer Communication Networks.Computer and Information Systems Applications.Data and Information Security.Mobile and Network Security.Cryptology.Computer System Implementation.658.872658.872Samarati PierangelaMiAaPQMiAaPQMiAaPQBOOK9910735789503321E-Business and Telecommunications1961627UNINA