Mostrando 10 resultados de: 19
Publisher
Advances in Intelligent Systems and Computing(2)
IEEE Access(2)
2018 IEEE 8th Annual Computing and Communication Workshop and Conference, CCWC 2018(1)
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2018(1)
2019 3rd Cyber Security in Networking Conference, CSNet 2019(1)
Área temáticas
Ciencias de la computación(7)
Métodos informáticos especiales(6)
Funcionamiento de bibliotecas y archivos(2)
Interacción social(2)
Otros problemas y servicios sociales(2)
Área de conocimiento
Ciencias de la computación(12)
Software(8)
Ingeniería de software(7)
Big data(1)
Innovación(1)
3BI-ECC: A Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography
Conference ObjectAbstract: Most of the authentication protocols assume the existence of a Trusted Third Party (TTP) in the formPalabras claves:BLOCKCHAIN, CYBERSECURITY, elliptic curves cryptography, self-generated certificates, self-generated identityAutores:Daniel Maldonado-Ruiz, El Madhoun N., Jenny TorresFuentes:googlescopusCookie scout: An analytic model for prevention of cross-site scripting (XSS) using a cookie classifier
Conference ObjectAbstract: Cross-Site Scripting (XSS) attack is a vulnerability typical of Web applications, where malicious scPalabras claves:BEEf, Cookies, Hook, JAVASCRIPT, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela Flores, Walter FuertesFuentes:googlescopusAn Innovative and Decentralized Identity Framework Based on Blockchain Technology
Conference ObjectAbstract: Network users usually need a third party validation to prove that they are who they claim to be. AutPalabras claves:BLOCKCHAIN, certificate, CYBERSECURITY, ECC, Identities, self-generated identityAutores:Badra M., Daniel Maldonado-Ruiz, El Madhoun N., Jenny TorresFuentes:googlescopusCross-site scripting (XSS) attacks and mitigation: A survey
ArticleAbstract: The results of the Cisco 2018 Annual Security Report show that all analyzed web applications have atPalabras claves:Cookies, DOM-XSS, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela FloresFuentes:googlescopusCurrent Trends in Blockchain Implementations on the Paradigm of Public Key Infrastructure: A Survey
ArticleAbstract: Since the emergence of the Bitcoin cryptocurrency, the blockchain technology has become the new IntePalabras claves:BKI, BLOCKCHAIN, Decentralised, Identity Management, PKI, Smart-contractsAutores:Badra M., Daniel Maldonado-Ruiz, El Madhoun N., Jenny TorresFuentes:googlescopusDesign decisions under object-oriented approach: A thematic analysis from the abstraction point of view
Conference ObjectAbstract: Many authors consider abstraction as one of the key principles in objected-oriented approach, but thPalabras claves:Abstraction, Object-oriented approach, QUALITATIVE RESEARCHAutores:Jenny Torres, Pamela Flores, Rigoberto Fonseca-DelgadoFuentes:googlescopusEmpirical study on the difficulties of software modeling through class diagrams
Conference ObjectAbstract: Software design is one of the stages of the software life cycle characterized as an activity of a crPalabras claves:Class diagram, Difficulties, empirical study, Object-oriented approach, thematic analysisAutores:Jenny Torres, Pamela Flores, Rodas C.A.Fuentes:googlescopusEnhancing intelligence SOC with big data tools
Conference ObjectAbstract: Traditional security tools are based on predetermined signatures or rules that show rigidity in thePalabras claves:BIG DATA, cognitive security, CYBERSECURITY, security operation centerAutores:Jenny Torres, Roberto Omar AndradeFuentes:googlescopusIdentifying Difficulties of Software Modeling Through Class Diagrams: A Long-Term Comparative Analysis
ArticleAbstract: Software modeling is a creative activity in which software components and their relationships are idPalabras claves:Computer science, computer science education, Object oriented modeling, Software design, Software Engineering, systems engineering educationAutores:Jenny Torres, Mayra Alvarez, Mayra Isabel Alvarez Jiménez, Pamela FloresFuentes:googlescopusIdentity-based cryptography: Applications, vulnerabilities, and future directions
Book PartAbstract: Since computer systems and communication become each time more pervasive, information security takesPalabras claves:Autores:Jenny Torres, Nogueira M., Pujolle G.Fuentes:googlescopus