Linked e-resources

Details

e-Business
The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions
An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective
Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices
Improved Protection of User Data through the Use of a Traceable Anonymous One Time Password
Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment
Digital Transformation and Management of Transfer in University Platforms
A Method for Bottleneck Detection, Prediction, and Recommendation using Process Mining Techniques
Security and Cryptography
A Classification of Software-architectural Uncertainty regarding Confidentiality
Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications
Improving Time Complexity and Utility of k-anonymous Microaggregation
Extended Formal Analysis of the EDHOC Protocol in Tamarin
Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies
Evaluating Defensive Countermeasures for Software-based Hardware Abstraction
Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics
On Applying Boolean Masking to Exponents
Trusted Implementation and Enforcement of Application-specific Security Policies
Selective Encryption for Owners' Control in Digital Data Markets.

Browse Subjects

Show more subjects...

Statistics

from
to
Export