Description:
e-Business -- The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions -- An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective -- Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices -- Improved Protection of User Data through the Use of a Traceable Anonymous One Time Password -- Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment -- Digital Transformation and Management of Transfer in University Platforms -- A Method for Bottleneck Detection, Prediction, and Recommendation using Process Mining Techniques -- Security and Cryptography -- A Classification of Software-architectural Uncertainty regarding Confidentiality -- Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications -- Improving Time Complexity and Utility of k-anonymous Microaggregation -- Extended Formal Analysis of the EDHOC Protocol in Tamarin -- Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies -- Evaluating Defensive Countermeasures for Software-based Hardware Abstraction -- Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics -- On Applying Boolean Masking to Exponents -- Trusted Implementation and Enforcement of Application-specific Security Policies -- Selective Encryption for Owners' Control in Digital Data Markets.
The present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021. The 17 full papers included in this book were carefully reviewed and selected from 197 submissions. They were organized in topical sections as follows: e-Business and security and cryptography.