LEADER 04667nam 22007455 450 001 996546843903316 005 20230810182254.0 010 $a3-031-36840-1 024 7 $a10.1007/978-3-031-36840-0 035 $a(MiAaPQ)EBC30661724 035 $a(Au-PeEL)EBL30661724 035 $a(DE-He213)978-3-031-36840-0 035 $a(PPN)272251283 035 $a(EXLCZ)9927757818500041 100 $a20230721d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aE-Business and Telecommunications$b[electronic resource] $e18th International Conference, ICETE 2021, Virtual Event, July 6?9, 2021, Revised Selected Papers /$fedited by Pierangela Samarati, Marten van Sinderen, Sabrina De Capitani di Vimercati, Fons Wijnhoven 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (422 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1795 311 08$aPrint version: Samarati, Pierangela E-Business and Telecommunications Cham : Springer,c2023 9783031368394 320 $aIncludes bibliographical references and index. 327 $ae-Business -- The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions -- An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective -- Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices -- Improved Protection of User Data through the Use of a Traceable Anonymous One Time Password -- Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment -- Digital Transformation and Management of Transfer in University Platforms -- A Method for Bottleneck Detection, Prediction, and Recommendation using Process Mining Techniques -- Security and Cryptography -- A Classification of Software-architectural Uncertainty regarding Confidentiality -- Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications -- Improving Time Complexity and Utility of k-anonymous Microaggregation -- Extended Formal Analysis of the EDHOC Protocol in Tamarin -- Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies -- Evaluating Defensive Countermeasures for Software-based Hardware Abstraction -- Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics -- On Applying Boolean Masking to Exponents -- Trusted Implementation and Enforcement of Application-specific Security Policies -- Selective Encryption for Owners' Control in Digital Data Markets. 330 $aThe present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021. The 17 full papers included in this book were carefully reviewed and selected from 197 submissions. They were organized in topical sections as follows: e-Business and security and cryptography. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1795 606 $aComputer networks 606 $aApplication software 606 $aData protection 606 $aComputer networks$xSecurity measures 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer systems 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aData and Information Security 606 $aMobile and Network Security 606 $aCryptology 606 $aComputer System Implementation 615 0$aComputer networks. 615 0$aApplication software. 615 0$aData protection. 615 0$aComputer networks$xSecurity measures. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer systems. 615 14$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aData and Information Security. 615 24$aMobile and Network Security. 615 24$aCryptology. 615 24$aComputer System Implementation. 676 $a658.872 702 $aSamarati$b Pierangela 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996546843903316 996 $aE-Business and Telecommunications$91961627 997 $aUNISA