E-Business and Telecommunications〈1st ed. 2023〉 : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, Revised Selected Papers

個数:1
紙書籍版価格
¥22,383
  • 電子書籍
  • ポイントキャンペーン

E-Business and Telecommunications〈1st ed. 2023〉 : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, Revised Selected Papers

  • 言語:ENG
  • ISBN:9783031368394
  • eISBN:9783031368400

ファイル: /

Description

The present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021.


The 17 full papers included in this book were carefully reviewed and selected from 197 submissions. They were organized in topical sections as follows: e-Business and security and cryptography.

Table of Contents

​e-Business.- The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions.- An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective.- Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices.- Improved Protection of User Data through the Use of a Traceable Anonymous One Time Password.- Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment.- Digital Transformation and Management of Transfer in University Platforms.- A Method for Bottleneck Detection, Prediction, and Recommendation using Process Mining Techniques.- Security and Cryptography.- A Classification of Software-architectural Uncertainty regarding Confidentiality.- Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications.- Improving Time Complexity andUtility of k-anonymous Microaggregation.- Extended Formal Analysis of the EDHOC Protocol in Tamarin.- Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies.- Evaluating Defensive Countermeasures for Software-based Hardware Abstraction.- Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics.- On Applying Boolean Masking to Exponents.- Trusted Implementation and Enforcement of Application-specific Security Policies.- Selective Encryption for Owners' Control in Digital Data Markets.

最近チェックした商品