Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021. The 17 full papers included in this book were carefully reviewed and selected from 197 submissions. They were organized in topical sections as follows: e-Business and security and cryptography.
The present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021.
The 17 full papers included in this book were carefully reviewed and selected from 197 submissions. They were organized in topical sections as follows: e-Business and security and cryptography.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
e-Business.- The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions.- An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective.- Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices.- Improved Protection of User Data through the Use of a Traceable Anonymous One Time Password.- Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment.- Digital Transformation and Management of Transfer in University Platforms.- A Method for Bottleneck Detection, Prediction, and Recommendation using Process Mining Techniques.- Security and Cryptography.- A Classification of Software-architectural Uncertainty regarding Confidentiality.- Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications.- Improving Time Complexity andUtility of k-anonymous Microaggregation.- Extended Formal Analysis of the EDHOC Protocol in Tamarin.- Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies.- Evaluating Defensive Countermeasures for Software-based Hardware Abstraction.- Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics.- On Applying Boolean Masking to Exponents.- Trusted Implementation and Enforcement of Application-specific Security Policies.- Selective Encryption for Owners' Control in Digital Data Markets.
e-Business.- The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions.- An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective.- Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices.- Improved Protection of User Data through the Use of a Traceable Anonymous One Time Password.- Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment.- Digital Transformation and Management of Transfer in University Platforms.- A Method for Bottleneck Detection, Prediction, and Recommendation using Process Mining Techniques.- Security and Cryptography.- A Classification of Software-architectural Uncertainty regarding Confidentiality.- Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications.- Improving Time Complexity andUtility of k-anonymous Microaggregation.- Extended Formal Analysis of the EDHOC Protocol in Tamarin.- Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies.- Evaluating Defensive Countermeasures for Software-based Hardware Abstraction.- Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics.- On Applying Boolean Masking to Exponents.- Trusted Implementation and Enforcement of Application-specific Security Policies.- Selective Encryption for Owners' Control in Digital Data Markets.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826