Mostrando 10 resultados de: 14
Filtros aplicados
Publisher
2020 Asia Conference on Computers and Communications, ACCC 2020(2)
ACM International Conference Proceeding Series(2)
Advances in Science, Technology and Engineering Systems(2)
Proceedings - 3rd International Conference on Information and Computer Technologies, ICICT 2020(2)
Proceedings of the 3rd World Conference on Smart Trends in Systems, Security and Sustainability, WorldS4 2019(2)
Área temáticas
Funcionamiento de bibliotecas y archivos(5)
Dirección general(4)
Ciencias de la computación(3)
Derecho constitucional y administrativo(3)
Administración pública y ciencia militar(2)
Área de conocimiento
Ciencias de la computación(6)
Gestión de riesgos(3)
Comunicación(2)
Tecnologías de la información y la comunicación(2)
Telecomunicaciones(2)
A Homomorphic Encryption Approach in a Voting System in a Distributed Architecture
Conference ObjectAbstract: It is considered that Electronic Votes is an alternative of safer systems, which provides greater coPalabras claves:cryptogram, encryption, Homomorphic, security database, Security InformationAutores:Chávez Chalén L.J., Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:googlescopusA security algorithms approach to apply to the civil registry database of the Ecuador
Conference ObjectAbstract: It was analyzed the most frequent security algorithms used for information security to mitigate thePalabras claves:Algorithm flowchart, authentication, Database, encryption, Models the security, Security InformationAutores:Antonio O., Mafla G. Enrique, Segundo Moisés Toapanta ToapantaFuentes:scopusAn approach of cyberattacks with the use of social networks and communication media for public organizations of the ecuador
Conference ObjectAbstract: An analysis was carried out of several cyber-attack methods that use Social Networks and Media as thPalabras claves:Cyber Security, Security Information, SOCIAL NETWORKSAutores:Dhilan Torres Tapia, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of Adequate Bandwidths to Guarantee an Electoral Process in Ecuador
Conference ObjectAbstract: The analysis of the appropriate bandwidths was made based on the electoral processes in countries wiPalabras claves:bandwidth, Electoral Process, Electoral processes, Protocols security, Security InformationAutores:Johan Eduardo Aguilar Piguave, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of HIPAA for adopt in the information security in the civil registry of the ecuador
Conference ObjectAbstract: It was determined that institutions, public and private worldwide have problems in confidentiality,Palabras claves:algorithm, Data integrity, HIPAA, MD5, Security InformationAutores:Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Stefany Joan Moran Paredes, Trejo J.A.O.Fuentes:scopusAnalysis of cybersecurity models suitable to apply in an electoral process in ecuador
Conference ObjectAbstract: Were analyzed different cybersecurity proposals to protect information, such as models, prototypes,Palabras claves:cyberattack, Cybersecurity Models, Electoral Process, Security Information, Threat modelAutores:Luis Enrique Mafla Gallegos, Manuel Agustin Aycart Armijos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of models of security to mitigate the risks, vulnerabilities and threats in a company of services of telecommunications
Conference ObjectAbstract: Different models in Information and Communication Technologies were analyzed for the creation of anPalabras claves:Matrix risks, Security Information, Security models, Telecommunications companies, vulnerabilitiesAutores:Chevez Moran M.J., Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of the blockchain for adoption in electronic commerce management in Ecuador
ArticleAbstract: The document describes the advancement of technology in commercial negotiations and functionality foPalabras claves:BLOCKCHAIN, Cryptographic techniques, E-Commerce, Security Information, TransactionsAutores:Daniela Monserrate Moreira Gamboa, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of vulnerabilities, risks and threats in the process of quota allocation for the State University of Ecuador
ArticleAbstract: Different models and standards of information security were analyzed, to adopt a model that mitigatePalabras claves:Allocation of quotas Vulnerability, College entrance, Quotas, risks, Security InformationAutores:Andrés Aurelio García Henriquez, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusDefinition of a security prototype for IoT applied to higher education
Conference ObjectAbstract: The Internet of thing had continued to confirm its important position in the context Information andPalabras claves:higher education, IOT, Prototype, security algorithms, Security InformationAutores:Joffre Marcelo Valverde López, Luis Enrique Mafla Gallegos, Raúl Segundo Tingo Soledispa, Segundo Moisés Toapanta ToapantaFuentes:scopus