Samarati / Wijnhoven / van Sinderen | E-Business and Telecommunications | Buch | 978-3-031-36839-4 | sack.de

Buch, Englisch, 412 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 645 g

Reihe: Communications in Computer and Information Science

Samarati / Wijnhoven / van Sinderen

E-Business and Telecommunications

18th International Conference, ICETE 2021, Virtual Event, July 6-9, 2021, Revised Selected Papers
1. Auflage 2023
ISBN: 978-3-031-36839-4
Verlag: Springer Nature Switzerland

18th International Conference, ICETE 2021, Virtual Event, July 6-9, 2021, Revised Selected Papers

Buch, Englisch, 412 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 645 g

Reihe: Communications in Computer and Information Science

ISBN: 978-3-031-36839-4
Verlag: Springer Nature Switzerland


The present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021.
The 17 full papers included in this book were carefully reviewed and selected from 197 submissions. They were organized in topical sections as follows: e-Business and security and cryptography.
Samarati / Wijnhoven / van Sinderen E-Business and Telecommunications jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


e-Business.- The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions.- An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective.- Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices.- Improved Protection of User Data through the Use of a Traceable Anonymous One Time Password.- Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment.- Digital Transformation and Management of Transfer in University Platforms.- A Method for Bottleneck Detection, Prediction, and Recommendation using Process Mining Techniques.- Security and Cryptography.- A Classification of Software-architectural Uncertainty regarding Confidentiality.- Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications.- Improving Time Complexity andUtility of k-anonymous Microaggregation.- Extended Formal Analysis of the EDHOC Protocol in Tamarin.- Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies.- Evaluating Defensive Countermeasures for Software-based Hardware Abstraction.- Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics.- On Applying Boolean Masking to Exponents.- Trusted Implementation and Enforcement of Application-specific Security Policies.- Selective Encryption for Owners' Control in Digital Data Markets.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.