Abstract is missing.
- The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual ExhibitionsNikolay Kalenov, Gennadiy Savin, Irina N. Sobolevskaya, Alexander N. Sotnikov. 3-28 [doi]
- An Analysis of Cultural Content on Short Video Platforms: Cultural Protection PerspectiveLifu Li, Kyeong Kang, Osama Sohaib. 29-50 [doi]
- Technology Transfer and Valuation Methods in Use by University Technology Transfer OfficesAntónio Rocha, Fernando Romero 0002, Rui M. Lima, Marlene Amorim, Manuela Cruz-Cunha. 51-66 [doi]
- Improved Protection of User Data Through the Use of a Traceable Anonymous One Time PasswordMukuka Kangwa, Charles S. Lubobya, Jackson Phiri. 67-83 [doi]
- Gamified Self-paced E-Learning: Two Iterations of an Educational Design ExperimentAnke Schüll, Laura Brocksieper. 84-102 [doi]
- Digital Transformation and Management of Transfer in University PlatformsClaudia Doering 0001, Finn Reiche, Holger Timinger. 103-117 [doi]
- A Method for Bottleneck Detection, Prediction, and Recommendation Using Process Mining TechniquesJean Paul Sebastian Piest, Rob Henk Bemthuis, Jennifer Alice Cutinha, Jeewanie Jayasinghe Arachchige, Faiza Allah Bukhsh. 118-136 [doi]
- A Classification of Software-Architectural Uncertainty Regarding ConfidentialitySebastian Hahner, Stephan Seifermann, Robert Heinrich, Ralf H. Reussner. 139-160 [doi]
- Zero-Knowledge Predicates for Hashing to Prime: Theory and ApplicationsThomas Groß. 161-194 [doi]
- Improving Time Complexity and Utility of k-anonymous MicroaggregationFlorian Thaeter, Rüdiger Reischuk. 195-223 [doi]
- Extended Formal Analysis of the EDHOC Protocol in TamarinKarl Norrman, Vaishnavi Sundararajan, Alessandro Bruni. 224-248 [doi]
- Putting the Pieces Together: Model-Based Engineering Workflows for Attribute-Based Access Control PoliciesMarius Schlegel, Peter Amthor 0001. 249-280 [doi]
- Evaluating Defensive Countermeasures for Software-Based Hardware AbstractionJ. Todd McDonald, Ramya K. Manikyam, Sébastien Bardin, Richard Bonichon, Todd R. Andel, James Carambat. 281-304 [doi]
- Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data AnalyticsNazim Uddin Sheikh, Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kâafar. 305-333 [doi]
- On Applying Boolean Masking to ExponentsMichael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos. 334-361 [doi]
- Trusted Implementation and Enforcement of Application Security PoliciesMarius Schlegel. 362-388 [doi]
- Selective Encryption for Owners' Control in Digital Data MarketsSara Foresti, Giovanni Livraga. 389-409 [doi]