Mostrando 10 resultados de: 29
Publisher
ACM International Conference Proceeding Series(5)
Proceedings - 3rd International Conference on Information and Computer Technologies, ICICT 2020(5)
Proceedings of the World Conference on Smart Trends in Systems, Security and Sustainability, WS4 2020(3)
Advances in Science, Technology and Engineering Systems(2)
Frontiers in Artificial Intelligence and Applications(2)
Área temáticas
Otros problemas y servicios sociales(5)
Economía financiera(4)
Funcionamiento de bibliotecas y archivos(4)
Administración pública(3)
Administración pública y ciencia militar(3)
Blockchain analysis applied to a process for the national public data system for Ecuador
Conference ObjectAbstract: Were analyzed the implementation of a Blockchain model for the national public data system. The probPalabras claves:BLOCKCHAIN, ETHEREUM, HYPERLEDGER, National system, Public dataAutores:Fabrizio Triviño, Mafla Gallegos L.E., Ordonez Baldeon P., Segundo Moisés Toapanta Toapanta, Trivino Trivino F.D.Fuentes:googlescopusAn immutable algorithm approach to improve the information security of a process for a public organization of Ecuador
ArticleAbstract: Currently, information security is among the main characteristics that must be achieved within the sPalabras claves:ALGORITHMS, Cryptography, securityAutores:Andrés Javier Bravo Jácome, Luis Enrique Mafla Gallegos, Máximo Giovani Tandazo Espinoza, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis Cryptographic for Electronic Votes in Systems of Distributed Architectures
Conference ObjectAbstract: It was considered that electronic voting is revolutionary around the world because of the new technoPalabras claves:ballots, Cryptography, Electronic voting, privacy, security, Smartmatic, voting platformAutores:Danny Wilfrido Barona Valencia, Mafla Gallegos L.E., Orellana Velez N.V., Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of Security Algorithms for a Distributed Database
Conference ObjectAbstract: We analyzed the security of a database considering the environment of distributed systems, there arePalabras claves:algorithm flowcharts, data security, distributed database, security algorithms, security of the informationAutores:Daniel Humberto Plua Moran, Félix Gustavo Mendoza Quimí, Maciel Arellano M.R., Mafla Gallegos L.E., Máximo Giovani Tandazo Espinoza, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of adequate security algorithms oriented to cybersecurity management for a distributed architecture
Conference ObjectAbstract: It was analyzed an environment between the references of certain security models and algorithms basePalabras claves:Access Control, CYBERSECURITY, Distributed architecture, DISTRIBUTED SYSTEMS, Security algorithmAutores:Christian Andres Orozco Bonilla, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of appropriate standards to solve cybersecurity problems in public organizations
Conference ObjectAbstract: The development of ICTs in the globalized world has forced countries to develop problems or implemenPalabras claves:Directrices de seguridad, Estándares ciberseguridad, ORGANIZACIONES PÚBLICASAutores:E. Gustavo Salomon Gaibor, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of new technologies in information security to mitigate data risks in a public organization
Conference ObjectAbstract: Were analyzed references on alternative technologies or new proposals to help mitigate data risks. TPalabras claves:foreign trade, information security, Mitigate the risks, New TechnologiesAutores:Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Medina Lara M.D., Segundo Moisés Toapanta ToapantaFuentes:googlescopusAnalysis of security mechanisms to mitigate hacker attacks to improve e-commerce management in Ecuador
Conference ObjectAbstract: The problem that was chosen for the elaboration of this scientific article, is the distrust on the pPalabras claves:Cyber attacks, electronic commerce, ETHICAL HACKING, Multi-factor authentication, vulnerabilityAutores:Bertha Alice Naranjo Sanchez, Bertha Naranjo Sanchez, Mafla Gallegos L.E., Mera Caicedo H.A., Segundo Moisés Toapanta ToapantaFuentes:googlescopusAnalysis of the blockchain for adoption in electronic commerce management in Ecuador
ArticleAbstract: The document describes the advancement of technology in commercial negotiations and functionality foPalabras claves:BLOCKCHAIN, Cryptographic techniques, E-Commerce, Security Information, TransactionsAutores:Daniela Monserrate Moreira Gamboa, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of the software most used by hackers to carry out penetration testing in public organizations
Conference ObjectAbstract: Currently, the software handled by hackers is the main one to tackle a series of empirical knowledgePalabras claves:HACKER, HACKING, Hacking tools, Malicious program, Public OrganizationsAutores:González R.F.P., Luis Enrique Mafla Gallegos, Máximo Giovani Tandazo Espinoza, Segundo Moisés Toapanta ToapantaFuentes:scopus