LEADER 04061nam 22007695 450 001 9910746957403321 005 20230929112443.0 010 $a9783031451379 010 $a3031451376 024 7 $a10.1007/978-3-031-45137-9 035 $a(MiAaPQ)EBC30764564 035 $a(Au-PeEL)EBL30764564 035 $a(DE-He213)978-3-031-45137-9 035 $a(PPN)272735965 035 $a(CKB)28443815400041 035 $a(OCoLC)1401919908 035 $a(EXLCZ)9928443815400041 100 $a20230929d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aE-Business and Telecommunications $e19th International Conference, ICSBT 2022, Lisbon, Portugal, July 14?16, 2022, and 19th International Conference, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022, Revised Selected Papers /$fedited by Marten Van Sinderen, Fons Wijnhoven, Slimane Hammoudi, Pierangela Samarati, Sabrina De Capitani di Vimercati 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (189 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1849 311 08$aPrint version: Van Sinderen, Marten E-Business and Telecommunications Cham : Springer,c2023 9783031451362 327 $aSPOT+: Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over Multiple Contact Information -- Blind side channel on the Elephant LFSR Extended version -- Stacked Ensemble Models Evaluation on DL Based SCA -- Explaining the Use of Cryptographic API in Android Malware -- Explaining the Use of Cryptographic API in Android Malware -- Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and their Mitigation -- Compressing Big OLAP Data Cubes in Big Data Analytics Systems: New Paradigms, a Reference Architecture, and Future Research Perspectives. 330 $aThis book includes extended and revised versions of a set of selected papers presented at the 19th International Conference on Smart Business Technologies, ICSBT 2022, Lisbon, Portugal, July 14?16, 2022, and 19th International Conference on Security and Cryptography, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022. The 7 full papers included in the volume were carefully selected from the 143 submissions accepted to participate in the conference. The papers present reciting research on e-Business technology and its current applications; and all aspects of security and privacy. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1849 606 $aComputer networks 606 $aApplication software 606 $aComputer networks$xSecurity measures 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer systems 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aMobile and Network Security 606 $aCryptology 606 $aComputer System Implementation 615 0$aComputer networks. 615 0$aApplication software. 615 0$aComputer networks$xSecurity measures. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer systems. 615 14$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aMobile and Network Security. 615 24$aCryptology. 615 24$aComputer System Implementation. 676 $a004.6 700 $aVan Sinderen$b Marten$0853406 701 $aWijnhoven$b Fons$01430843 701 $aHammoudi$b Slimane$0846214 701 $aSamarati$b Pierangela$01430844 701 $aVimercati$b Sabrina De Capitani di$01430845 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910746957403321 996 $aE-Business and Telecommunications$93570859 997 $aUNINA