


default search action
18th ICETE 2021: Virtual Event - Selected Papers
- Pierangela Samarati, Marten van Sinderen
, Sabrina De Capitani di Vimercati, Fons Wijnhoven
:
E-Business and Telecommunications - 18th International Conference, ICETE 2021, Virtual Event, July 6-9, 2021, Revised Selected Papers. Communications in Computer and Information Science 1795, Springer 2023, ISBN 978-3-031-36839-4
e-Business
- Nikolay Kalenov
, Gennadiy Savin
, Irina N. Sobolevskaya
, Alexander N. Sotnikov
:
The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions. 3-28 - Lifu Li
, Kyeong Kang, Osama Sohaib
:
An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective. 29-50 - António Rocha
, Fernando Romero
, Rui M. Lima
, Marlene Amorim
, Manuela Cruz-Cunha
:
Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices. 51-66 - Mukuka Kangwa
, Charles S. Lubobya, Jackson Phiri
:
Improved Protection of User Data Through the Use of a Traceable Anonymous One Time Password. 67-83 - Anke Schüll
, Laura Brocksieper:
Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment. 84-102 - Claudia Doering
, Finn Reiche
, Holger Timinger
:
Digital Transformation and Management of Transfer in University Platforms. 103-117 - Jean Paul Sebastian Piest
, Rob Henk Bemthuis
, Jennifer Alice Cutinha
, Jeewanie Jayasinghe Arachchige
, Faiza Allah Bukhsh
:
A Method for Bottleneck Detection, Prediction, and Recommendation Using Process Mining Techniques. 118-136
Security and Cryptography
- Sebastian Hahner
, Stephan Seifermann, Robert Heinrich, Ralf H. Reussner:
A Classification of Software-Architectural Uncertainty Regarding Confidentiality. 139-160 - Thomas Groß:
Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications. 161-194 - Florian Thaeter, Rüdiger Reischuk:
Improving Time Complexity and Utility of k-anonymous Microaggregation. 195-223 - Karl Norrman
, Vaishnavi Sundararajan
, Alessandro Bruni:
Extended Formal Analysis of the EDHOC Protocol in Tamarin. 224-248 - Marius Schlegel
, Peter Amthor
:
Putting the Pieces Together: Model-Based Engineering Workflows for Attribute-Based Access Control Policies. 249-280 - Jeffrey Todd McDonald
, Ramya K. Manikyam
, Sébastien Bardin
, Richard Bonichon, Todd R. Andel, James Carambat:
Evaluating Defensive Countermeasures for Software-Based Hardware Abstraction. 281-304 - Nazim Uddin Sheikh
, Zhigang Lu, Hassan Jameel Asghar
, Mohamed Ali Kâafar
:
Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics. 305-333 - Michael Tunstall
, Louiza Papachristodoulou, Kostas Papagiannopoulos:
On Applying Boolean Masking to Exponents. 334-361 - Marius Schlegel
:
Trusted Implementation and Enforcement of Application Security Policies. 362-388 - Sara Foresti
, Giovanni Livraga
:
Selective Encryption for Owners' Control in Digital Data Markets. 389-409

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.