Linked e-resources
Details
Table of Contents
e-Business
The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions
An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective
Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices
Improved Protection of User Data through the Use of a Traceable Anonymous One Time Password
Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment
Digital Transformation and Management of Transfer in University Platforms
A Method for Bottleneck Detection, Prediction, and Recommendation using Process Mining Techniques
Security and Cryptography
A Classification of Software-architectural Uncertainty regarding Confidentiality
Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications
Improving Time Complexity and Utility of k-anonymous Microaggregation
Extended Formal Analysis of the EDHOC Protocol in Tamarin
Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies
Evaluating Defensive Countermeasures for Software-based Hardware Abstraction
Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics
On Applying Boolean Masking to Exponents
Trusted Implementation and Enforcement of Application-specific Security Policies
Selective Encryption for Owners' Control in Digital Data Markets.
The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions
An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective
Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices
Improved Protection of User Data through the Use of a Traceable Anonymous One Time Password
Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment
Digital Transformation and Management of Transfer in University Platforms
A Method for Bottleneck Detection, Prediction, and Recommendation using Process Mining Techniques
Security and Cryptography
A Classification of Software-architectural Uncertainty regarding Confidentiality
Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications
Improving Time Complexity and Utility of k-anonymous Microaggregation
Extended Formal Analysis of the EDHOC Protocol in Tamarin
Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies
Evaluating Defensive Countermeasures for Software-based Hardware Abstraction
Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics
On Applying Boolean Masking to Exponents
Trusted Implementation and Enforcement of Application-specific Security Policies
Selective Encryption for Owners' Control in Digital Data Markets.