Login / Signup
ICETE (Selected Papers)
2005
2011
2017
2023
2005
2023
Keyphrases
Publications
volume 1795, 2023
E-Business and Telecommunications - 18th International Conference, ICETE 2021, Virtual Event, July 6-9, 2021, Revised Selected Papers
ICETE (Selected Papers)
1795 (2023)
2021
Sebastian Hahner
,
Stephan Seifermann
,
Robert Heinrich
,
Ralf H. Reussner
A Classification of Software-Architectural Uncertainty Regarding Confidentiality.
ICETE (Selected Papers)
(2021)
Florian Thaeter
,
Rüdiger Reischuk
Improving Time Complexity and Utility of k-anonymous Microaggregation.
ICETE (Selected Papers)
(2021)
António Rocha
,
Fernando Romero
,
Rui M. Lima
,
Marlene Amorim
,
Manuela Cruz-Cunha
Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices.
ICETE (Selected Papers)
(2021)
Mukuka Kangwa
,
Charles S. Lubobya
,
Jackson Phiri
Improved Protection of User Data Through the Use of a Traceable Anonymous One Time Password.
ICETE (Selected Papers)
(2021)
Anke Schüll
,
Laura Brocksieper
Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment.
ICETE (Selected Papers)
(2021)
Marius Schlegel
Trusted Implementation and Enforcement of Application Security Policies.
ICETE (Selected Papers)
(2021)
Michael Tunstall
,
Louiza Papachristodoulou
,
Kostas Papagiannopoulos
On Applying Boolean Masking to Exponents.
ICETE (Selected Papers)
(2021)
Jean Paul Sebastian Piest
,
Rob Henk Bemthuis
,
Jennifer Alice Cutinha
,
Jeewanie Jayasinghe Arachchige
,
Faiza Allah Bukhsh
A Method for Bottleneck Detection, Prediction, and Recommendation Using Process Mining Techniques.
ICETE (Selected Papers)
(2021)
Karl Norrman
,
Vaishnavi Sundararajan
,
Alessandro Bruni
Extended Formal Analysis of the EDHOC Protocol in Tamarin.
ICETE (Selected Papers)
(2021)
Sara Foresti
,
Giovanni Livraga
Selective Encryption for Owners' Control in Digital Data Markets.
ICETE (Selected Papers)
(2021)
Jeffrey Todd McDonald
,
Ramya K. Manikyam
,
Sébastien Bardin
,
Richard Bonichon
,
Todd R. Andel
,
James Carambat
Evaluating Defensive Countermeasures for Software-Based Hardware Abstraction.
ICETE (Selected Papers)
(2021)
Nikolay Kalenov
,
Gennadiy Savin
,
Irina N. Sobolevskaya
,
Alexander N. Sotnikov
The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions.
ICETE (Selected Papers)
(2021)
Thomas Groß
Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications.
ICETE (Selected Papers)
(2021)
Claudia Doering
,
Finn Reiche
,
Holger Timinger
Digital Transformation and Management of Transfer in University Platforms.
ICETE (Selected Papers)
(2021)
Nazim Uddin Sheikh
,
Zhigang Lu
,
Hassan Jameel Asghar
,
Mohamed Ali Kâafar
Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics.
ICETE (Selected Papers)
(2021)
Marius Schlegel
,
Peter Amthor
Putting the Pieces Together: Model-Based Engineering Workflows for Attribute-Based Access Control Policies.
ICETE (Selected Papers)
(2021)
Lifu Li
,
Kyeong Kang
,
Osama Sohaib
An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective.
ICETE (Selected Papers)
(2021)
volume 1484, 2021
E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8-10, 2020, Revised Selected Papers
ICETE (Selected Papers)
1484 (2021)
2020
Ferucio Laurentiu Tiplea
,
Alexandru Ionita
,
Anca-Maria Nica
Practically Efficient Attribute-Based Encryption for Compartmented and Multilevel Access Structures.
ICETE (Selected Papers)
(2020)
Catalin V. Bîrjoveanu
,
Mirela Bîrjoveanu
Chained Transaction Protocol Automated Verification Using Cl-AtSe.
ICETE (Selected Papers)
(2020)
Panagiotis Dedousis
,
George Stergiopoulos
,
Dimitris Gritzalis
An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems.
ICETE (Selected Papers)
(2020)
Marco Anisetti
,
Claudio Agostino Ardagna
,
Nicola Bena
,
Ernesto Damiani
An Assurance Framework and Process for Hybrid Systems.
ICETE (Selected Papers)
(2020)
Michael Ekonde Sone
Security and Complexity of a New Variant of the McEliece Cryptosystem Using Non-linear Convolutional Codes.
ICETE (Selected Papers)
(2020)
Marco Baldi
,
Alessandro Barenghi
,
Franco Chiaraluce
,
Gerardo Pelosi
,
Paolo Santini
Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems.
ICETE (Selected Papers)
(2020)
Oussama Trabelsi
,
Lilia Sfaxi
,
Riadh Robbana
A Secure Distributed Hash-Based Encryption Mode of Operation Suited for Big Data Systems.
ICETE (Selected Papers)
(2020)
Malgorzata Pankowska
Business Analyst Tasks for Requirement Elicitation.
ICETE (Selected Papers)
(2020)
Florian Grante
,
Ghalid I. Abib
,
Muriel Muller
,
Nel Samama
Overall Feasibility of RF Energy Harvesting for IoT.
ICETE (Selected Papers)
(2020)
Itzel Vázquez Sandoval
,
Arash Atashpendar
,
Gabriele Lenzini
,
Peter Y. A. Ryan
PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE.
ICETE (Selected Papers)
(2020)
volume 1247, 2020
E-Business and Telecommunications - 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26-28, 2019, Revised Selected Papers
ICETE (Selected Papers)
1247 (2020)
2019
Soon Xin Ng
Cooperative Communications, Distributed Coding and Machine Learning.
ICETE (Selected Papers)
(2019)
Dorra Dhaou
,
Saoussen Ben Jabra
,
Ezzeddine Zagrouba
An Invisible Hybrid 3D Video Watermarking Robust Against Malicious Attacks.
ICETE (Selected Papers)
(2019)
Fabian Berner
,
René Mayrhofer
,
Johannes Sametinger
Dynamic Taint Tracking Simulation.
ICETE (Selected Papers)
(2019)
Lukas Waidelich
,
Alexander Richter
,
Rebecca Bulander
,
Bernhard Kölmel
,
Patrice Glaser
Product-Service Systems at a Glance - How Classification and Typification Contribute to Comprehensibility.
ICETE (Selected Papers)
(2019)
Yuliya Vybornova
,
Vladislav Sergeev
Copyright Protection Method for Vector Map Data.
ICETE (Selected Papers)
(2019)
Martin Holkovic
,
Libor Polcák
,
Ondrej Rysavý
Application Error Detection in Networks by Protocol Behavior Model.
ICETE (Selected Papers)
(2019)
Octavian Catrina
Evaluation of Floating-Point Arithmetic Protocols Based on Shamir Secret Sharing.
ICETE (Selected Papers)
(2019)
Radu Ciucanu
,
Matthieu Giraud
,
Pascal Lafourcade
,
Lihua Ye
Secure and Efficient Matrix Multiplication with MapReduce.
ICETE (Selected Papers)
(2019)
Salah S. Harb
,
M. Omair Ahmad
,
M. N. S. Swamy
).
ICETE (Selected Papers)
(2019)
Alejandro Delgado Castro
,
John E. Szymanski
A Note Event-Based Decomposition of Polyphonic Recordings Applied to Single-channel Audio Source Separation.
ICETE (Selected Papers)
(2019)
Rui Yan
,
Fan Li
,
Xiaoyu Wang
,
Tapani Ristaniemi
,
Fengyu Cong
Automatic Sleep Scoring Toolbox and Its Application in Sleep Apnea.
ICETE (Selected Papers)
(2019)
volume 990, 2019
E-Business and Telecommunications - 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper
ICETE (Selected Papers)
990 (2019)
2017
Damien Jauvart
,
Nadia El Mrabet
,
Jacques J. A. Fournier
,
Louis Goubin
Resistance of the Point Randomisation Countermeasure for Pairings Against Side-Channel Attack.
ICETE (Selected Papers)
(2017)
Markus Engel
,
Christopher Kramer
,
Tobias Braun
,
Dennis Christmann
,
Reinhard Gotzhein
BiPS - A Real-Time-Capable Protocol Framework for Wireless Networked Control Systems and Its Application.
ICETE (Selected Papers)
(2017)
Andreas Ahrens
,
André Sandmann
,
Steffen Lochmann
Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers.
ICETE (Selected Papers)
(2017)
Evangelos D. Spyrou
Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks.
ICETE (Selected Papers)
(2017)
Alexandre Anzala-Yamajako
,
Olivier Bernard
,
Matthieu Giraud
,
Pascal Lafourcade
No Such Thing as a Small Leak: Leakage-Abuse Attacks Against Symmetric Searchable Encryption.
ICETE (Selected Papers)
(2017)
Michele Luglio
,
Cesare Roseti
,
E. Russo
,
Francesco Zampognaro
Ka-band High Throughput Satellites for 5G Based Applications: The Athena-Fidus Case Study.
ICETE (Selected Papers)
(2017)
Negar Mosharraf
,
Anura P. Jayasumana
,
Indrakshi Ray
,
Bruhadeshwar Bezawada
History-Based Throttling of Distributed Denial-of-Service Attacks.
ICETE (Selected Papers)
(2017)
volume 764, 2017
E-Business and Telecommunications - 13th International Joint Conference, ICETE 2016, Lisbon, Portugal, July 26-28, 2016, Revised Selected Papers
ICETE (Selected Papers)
764 (2017)