Atjaunināt sīkdatņu piekrišanu

E-Business and Telecommunications: 18th International Conference, ICETE 2021, Virtual Event, July 69, 2021, Revised Selected Papers 1st ed. 2023 [Mīkstie vāki]

  • Formāts: Paperback / softback, 412 pages, height x width: 235x155 mm, weight: 652 g, 74 Illustrations, color; 51 Illustrations, black and white; XIV, 412 p. 125 illus., 74 illus. in color., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 1795
  • Izdošanas datums: 22-Jul-2023
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031368398
  • ISBN-13: 9783031368394
  • Mīkstie vāki
  • Cena: 78,14 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 91,94 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 412 pages, height x width: 235x155 mm, weight: 652 g, 74 Illustrations, color; 51 Illustrations, black and white; XIV, 412 p. 125 illus., 74 illus. in color., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 1795
  • Izdošanas datums: 22-Jul-2023
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031368398
  • ISBN-13: 9783031368394
The present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021.

The 17 full papers included in this book were carefully reviewed and selected from 197 submissions. They were organized in topical sections as follows: e-Business and security and cryptography.
e-Business.- The Digital Content Formation Labor Costs for Electronic
Libraries and Examples of the Formation of Virtual Exhibitions.- An Analysis
of Cultural Content on Short Video Platforms: Cultural Protection
Perspective.- Technology Transfer and Valuation Methods in Use by
University Technology Transfer Offices.- Improved Protection of User Data
through the Use of a Traceable Anonymous One Time Password.- Gamified
Self-paced E-Learning: Two Iterations of an Educational Design
Experiment.- Digital Transformation and Management of Transfer in
University Platforms.- A Method for Bottleneck Detection, Prediction, and
Recommendation using Process Mining Techniques.- Security and
Cryptography.- A Classification of Software-architectural Uncertainty
regarding Confidentiality.- Zero-Knowledge Predicates for Hashing to Prime:
Theory and Applications.- Improving Time Complexity andUtility of k-anonymous
Microaggregation.- Extended Formal Analysis of the EDHOC Protocol in
Tamarin.- Putting the Pieces Together: Model-based Engineering Workflows
for Attribute-based Access Control Policies.- Evaluating Defensive
Countermeasures for Software-based Hardware Abstraction.- Trace Recovery:
Attacking and Defending the User Privacy in Smart Meter Data Analytics.- On
Applying Boolean Masking to Exponents.- Trusted Implementation and
Enforcement of Application-specific Security Policies.- Selective Encryption
for Owners' Control in Digital Data Markets.