Mostrando 7 resultados de: 7
Filtros aplicados
Publisher
Proceedings - 3rd International Conference on Information and Computer Technologies, ICICT 2020(2)
ACM International Conference Proceeding Series(1)
Advances in Science, Technology and Engineering Systems(1)
Frontiers in Artificial Intelligence and Applications(1)
Proceedings - 2019 2nd International Conference on Safety Produce Informatization, IICSPI 2019(1)
Área temáticas
Administración pública(2)
Derecho constitucional y administrativo(2)
El proceso político(2)
Funcionamiento de bibliotecas y archivos(2)
Programación informática, programas, datos, seguridad(2)
Área de conocimiento
Administración pública(3)
Ciencias de la computación(3)
Ciencia ambiental(1)
Gestión de riesgos(1)
Telecomunicaciones(1)
Objetivos de Desarrollo Sostenible
ODS 9: Industria, innovación e infraestructura(7)
ODS 16: Paz, justicia e instituciones sólidas(5)
ODS 17: Alianzas para lograr los objetivos(4)
ODS 8: Trabajo decente y crecimiento económico(3)
ODS 11: Ciudades y comunidades sostenibles(1)
Origen
google(2)
A Homomorphic Encryption Approach in a Voting System in a Distributed Architecture
Conference ObjectAbstract: It is considered that Electronic Votes is an alternative of safer systems, which provides greater coPalabras claves:cryptogram, encryption, Homomorphic, security database, Security InformationAutores:Chávez Chalén L.J., Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:googlescopusAnalysis of models of security to mitigate the risks, vulnerabilities and threats in a company of services of telecommunications
Conference ObjectAbstract: Different models in Information and Communication Technologies were analyzed for the creation of anPalabras claves:Matrix risks, Security Information, Security models, Telecommunications companies, vulnerabilitiesAutores:Chevez Moran M.J., Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of new technologies in information security to mitigate data risks in a public organization
Conference ObjectAbstract: Were analyzed references on alternative technologies or new proposals to help mitigate data risks. TPalabras claves:foreign trade, information security, Mitigate the risks, New TechnologiesAutores:Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Medina Lara M.D., Segundo Moisés Toapanta ToapantaFuentes:googlescopusAn Approach to the Efficient Security Algorithms Used in Voting Scanning in an Electoral Process
Conference ObjectAbstract: It was considered that the security of information is an important factor in an electoral process inPalabras claves:ALGORITHMS, Cryptography, Electoral Process, electronic voting., SCANNING, security, voting platformAutores:Javier Gonzalo Ortiz Rojas, Lamar J.A.T., Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusPrototype of an alignment model of the Ministry of Telecommunications and the Information Society to a public organization in Ecuador
Conference ObjectAbstract: This work contains information on technological advances in various public institutions in Ecuador,Palabras claves:Alignment model, Electronic Government, Information technologyAutores:Canales M.J.M., Javier Gonzalo Ortiz Rojas, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusProposal of ledger technology to apply to a public organization in Ecuador
ArticleAbstract: Ledger technology has now changed financial systems around the world, applying this technology to thPalabras claves:algorithm, BLOCKCHAIN, Database, Distributed System, ECUADOR, Ledger Technology, PUBLIC ORGANIZATIONAutores:Adrian Alberto Chávez Monteverde, Javier Gonzalo Ortiz Rojas, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusSecurity technologies to improve risk management against natural or anthropic disasters in Ecuador
Conference ObjectAbstract: The integration of three security technologies implemented in an event-based architectural style wasPalabras claves:Alerts, Detection systems, events, Mass notification, Security technologiesAutores:Javier Gonzalo Ortiz Rojas, Loor K.N.A., Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopus