Cantitate/Preț
Produs

E-Business and Telecommunications: 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, Revised Selected Papers: Communications in Computer and Information Science, cartea 1795

Editat de Pierangela Samarati, Marten van Sinderen, Sabrina De Capitani di Vimercati, Fons Wijnhoven
en Limba Engleză Paperback – 22 iul 2023
The present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021.

The 17 full papers included in this book were carefully reviewed and selected from 197 submissions. They were organized in topical sections as follows: e-Business and security and cryptography.
Citește tot Restrânge

Din seria Communications in Computer and Information Science

Preț: 53804 lei

Preț vechi: 67255 lei
-20% Nou

Puncte Express: 807

Preț estimativ în valută:
10298 10709$ 8617£

Carte tipărită la comandă

Livrare economică 15-29 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783031368394
ISBN-10: 3031368398
Ilustrații: XIV, 412 p. 125 illus., 74 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.59 kg
Ediția:1st ed. 2023
Editura: Springer Nature Switzerland
Colecția Springer
Seria Communications in Computer and Information Science

Locul publicării:Cham, Switzerland

Cuprins

​e-Business.- The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions.- An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective.- Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices.- Improved Protection of User Data through the Use of a Traceable Anonymous One Time Password.- Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment.- Digital Transformation and Management of Transfer in University Platforms.- A Method for Bottleneck Detection, Prediction, and Recommendation using Process Mining Techniques.- Security and Cryptography.- A Classification of Software-architectural Uncertainty regarding Confidentiality.- Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications.- Improving Time Complexity andUtility of k-anonymous Microaggregation.- Extended Formal Analysis of the EDHOC Protocol in Tamarin.- Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies.- Evaluating Defensive Countermeasures for Software-based Hardware Abstraction.- Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics.- On Applying Boolean Masking to Exponents.- Trusted Implementation and Enforcement of Application-specific Security Policies.- Selective Encryption for Owners' Control in Digital Data Markets.