Mostrando 10 resultados de: 44
Filtros aplicados
Publisher
Applied Sciences (Switzerland)(4)
Communications in Computer and Information Science(4)
2018 5th International Conference on eDemocracy and eGovernment, ICEDEG 2018(3)
International Journal of Applied Engineering Research(3)
ACM International Conference Proceeding Series(2)
Área temáticas
Ciencias de la computación(22)
Física aplicada(14)
Programación informática, programas, datos, seguridad(14)
Métodos informáticos especiales(5)
Criminología(3)
Área de conocimiento
Ciencias de la computación(22)
Red informática(9)
Software(7)
Red de sensores inalámbricos(5)
Comunicación(3)
Enhanced BSN-Care: Cryptanalysis of BSN-Care and proposal of improved authentication system
Conference ObjectAbstract: Recently, loT based healthcare systems have evolved as a tool to enhance the quality of life of peopPalabras claves:BAN logic, Healthcare service, internet of things, security, Sensor network, user authenticationAutores:Fidel Gastro de la Gruz, Sang Guun YooFuentes:googlescopusEnhanced intrusion detection system for PKMv2 EAP-AKA used in WiBro
ArticleAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is an emePalabras claves:authentication, Denial of Service, EAP-AKA, intrusion detection, Network security, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun Yoo, Yang Y.K.Fuentes:googlescopusEnhanced misuse cases for prioritization of security requirements
Conference ObjectAbstract: Nowadays, it is impossible to ignore the implementation of security features in information systemsPalabras claves:Misuse case, prioritization, requirement engineering, Software Engineering, Use caseAutores:Kim J., Sang Guun Yoo, Vaca H.P.Fuentes:googlescopusEnhancement to the Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems
Conference ObjectAbstract: Indoor location-based application and services based on Wi-Fi have serious problems in terms of privPalabras claves:Anonymous de-authentication, indoor positioning system, Ips, privacy, WlanAutores:Barriga J.J.A., Juan Carlos Polo, Sang Guun YooFuentes:googlescopusDebug port protection mechanism for secure embedded devices
ArticleAbstract: In this paper we propose a protection mechanism for the debug port. While debug ports are useful tooPalabras claves:Authentication token, Debug port, Device hackingAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusConfidential information protection system for mobile devices
ArticleAbstract: Mobile devices such as tab devices (e.g. iPad, Galaxy Tab), smart phones, laptops, and ultra-mobilePalabras claves:Information protection, Mobile device, Secure file system, Secure protocolAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusControlling a Wheelchair using a Brain Computer Interface based on User Controlled Eye Blinks
ArticleAbstract: Data published by different organizations such as the United Nations indicates that there are a largPalabras claves:Bci, Brain computer interface, EEG, eye blink detection, OpenBCIAutores:Sang Guun Yoo, Tituana D.E.V., Zavala S.P.Fuentes:googlescopusDetection of altered states of consciousness on facebook users
ArticleAbstract: Technologic advance in the last decades has permitted the development of many applications that avoiPalabras claves:Altered states of consciousness, consciousness, facebook, Social NetworkAutores:Sang Guun Yoo, Villota E.J.Fuentes:googlescopusDeveloping an Information Security Management System for Libraries Based on an Improved Risk Analysis Methodology Compatible with ISO/IEC 27001
Conference ObjectAbstract: This paper describes a new risk analysis methodology for libraries based on steps filtered from exisPalabras claves:information security, Information security management system, Risk management methodologyAutores:MARIA JOSE BRAVO RAMOS, Sang Guun YooFuentes:googlescopusDevelopment of a timestamping web application for the electronic factoring process in Ecuador
ArticleAbstract: This document describes the experience in developing a Timestamping application for the Electronic FPalabras claves:FACTORING, security, Timestamping, UWE, XMLAutores:Jesus Mendoza Macias, Sang Guun YooFuentes:googlescopus