default search action
18th ICETE 2021: Virtual Event - Selected Papers
- Pierangela Samarati, Marten van Sinderen, Sabrina De Capitani di Vimercati, Fons Wijnhoven:
E-Business and Telecommunications - 18th International Conference, ICETE 2021, Virtual Event, July 6-9, 2021, Revised Selected Papers. Communications in Computer and Information Science 1795, Springer 2023, ISBN 978-3-031-36839-4
e-Business
- Nikolay Kalenov, Gennadiy Savin, Irina N. Sobolevskaya, Alexander N. Sotnikov:
The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions. 3-28 - Lifu Li, Kyeong Kang, Osama Sohaib:
An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective. 29-50 - António Rocha, Fernando Romero, Rui M. Lima, Marlene Amorim, Manuela Cruz-Cunha:
Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices. 51-66 - Mukuka Kangwa, Charles S. Lubobya, Jackson Phiri:
Improved Protection of User Data Through the Use of a Traceable Anonymous One Time Password. 67-83 - Anke Schüll, Laura Brocksieper:
Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment. 84-102 - Claudia Doering, Finn Reiche, Holger Timinger:
Digital Transformation and Management of Transfer in University Platforms. 103-117 - Jean Paul Sebastian Piest, Rob Henk Bemthuis, Jennifer Alice Cutinha, Jeewanie Jayasinghe Arachchige, Faiza Allah Bukhsh:
A Method for Bottleneck Detection, Prediction, and Recommendation Using Process Mining Techniques. 118-136
Security and Cryptography
- Sebastian Hahner, Stephan Seifermann, Robert Heinrich, Ralf H. Reussner:
A Classification of Software-Architectural Uncertainty Regarding Confidentiality. 139-160 - Thomas Groß:
Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications. 161-194 - Florian Thaeter, Rüdiger Reischuk:
Improving Time Complexity and Utility of k-anonymous Microaggregation. 195-223 - Karl Norrman, Vaishnavi Sundararajan, Alessandro Bruni:
Extended Formal Analysis of the EDHOC Protocol in Tamarin. 224-248 - Marius Schlegel, Peter Amthor:
Putting the Pieces Together: Model-Based Engineering Workflows for Attribute-Based Access Control Policies. 249-280 - Jeffrey Todd McDonald, Ramya K. Manikyam, Sébastien Bardin, Richard Bonichon, Todd R. Andel, James Carambat:
Evaluating Defensive Countermeasures for Software-Based Hardware Abstraction. 281-304 - Nazim Uddin Sheikh, Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kâafar:
Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics. 305-333 - Michael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos:
On Applying Boolean Masking to Exponents. 334-361 - Marius Schlegel:
Trusted Implementation and Enforcement of Application Security Policies. 362-388 - Sara Foresti, Giovanni Livraga:
Selective Encryption for Owners' Control in Digital Data Markets. 389-409
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.