Mostrando 10 resultados de: 14
Filtros aplicados
Publisher
2020 Asia Conference on Computers and Communications, ACCC 2020(2)
ACM International Conference Proceeding Series(2)
Advances in Science, Technology and Engineering Systems(2)
Proceedings - 3rd International Conference on Information and Computer Technologies, ICICT 2020(2)
Proceedings of the 3rd World Conference on Smart Trends in Systems, Security and Sustainability, WorldS4 2019(2)
Área temáticas
Funcionamiento de bibliotecas y archivos(5)
Dirección general(4)
Ciencias de la computación(3)
Derecho constitucional y administrativo(3)
Administración pública y ciencia militar(2)
Área de conocimiento
Ciencias de la computación(6)
Gestión de riesgos(3)
Comunicación(2)
Tecnologías de la información y la comunicación(2)
Telecomunicaciones(2)
Hyperledger technology in public organizations in Ecuador
Conference ObjectAbstract: The globalization of information has been present in several contexts and required in digital lathesPalabras claves:BLOCKCHAIN, HYPERLEDGER, Immutable logs, Information integrity, Security InformationAutores:Maciel Arellano M.R., Mafla Gallegos L.E., Segundo Moisés Toapanta Toapanta, Tatiana Fernanda Prado QuintanaFuentes:scopusEvaluation of algorithms and security protocols to mitigate the risks in commercial transactions carried out by public companies
Conference ObjectAbstract: The security problems in electronic commerce in transactions are very evident in public companies. TPalabras claves:algorithm, Protocol security, risks, Security Information, vulnerabilitiesAutores:Alex Enrique Aranda Alvarado, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Solis M.P.Fuentes:scopusDefinition of a security prototype for IoT applied to higher education
Conference ObjectAbstract: The Internet of thing had continued to confirm its important position in the context Information andPalabras claves:higher education, IOT, Prototype, security algorithms, Security InformationAutores:Joffre Marcelo Valverde López, Luis Enrique Mafla Gallegos, Raúl Segundo Tingo Soledispa, Segundo Moisés Toapanta ToapantaFuentes:scopusA Homomorphic Encryption Approach in a Voting System in a Distributed Architecture
Conference ObjectAbstract: It is considered that Electronic Votes is an alternative of safer systems, which provides greater coPalabras claves:cryptogram, encryption, Homomorphic, security database, Security InformationAutores:Chávez Chalén L.J., Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:googlescopusA security algorithms approach to apply to the civil registry database of the Ecuador
Conference ObjectAbstract: It was analyzed the most frequent security algorithms used for information security to mitigate thePalabras claves:Algorithm flowchart, authentication, Database, encryption, Models the security, Security InformationAutores:Antonio O., Mafla G. Enrique, Segundo Moisés Toapanta ToapantaFuentes:scopusAn approach of cyberattacks with the use of social networks and communication media for public organizations of the ecuador
Conference ObjectAbstract: An analysis was carried out of several cyber-attack methods that use Social Networks and Media as thPalabras claves:Cyber Security, Security Information, SOCIAL NETWORKSAutores:Dhilan Torres Tapia, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of Adequate Bandwidths to Guarantee an Electoral Process in Ecuador
Conference ObjectAbstract: The analysis of the appropriate bandwidths was made based on the electoral processes in countries wiPalabras claves:bandwidth, Electoral Process, Electoral processes, Protocols security, Security InformationAutores:Johan Eduardo Aguilar Piguave, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of HIPAA for adopt in the information security in the civil registry of the ecuador
Conference ObjectAbstract: It was determined that institutions, public and private worldwide have problems in confidentiality,Palabras claves:algorithm, Data integrity, HIPAA, MD5, Security InformationAutores:Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Stefany Joan Moran Paredes, Trejo J.A.O.Fuentes:scopusAnalysis of cybersecurity models suitable to apply in an electoral process in ecuador
Conference ObjectAbstract: Were analyzed different cybersecurity proposals to protect information, such as models, prototypes,Palabras claves:cyberattack, Cybersecurity Models, Electoral Process, Security Information, Threat modelAutores:Luis Enrique Mafla Gallegos, Manuel Agustin Aycart Armijos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of models of security to mitigate the risks, vulnerabilities and threats in a company of services of telecommunications
Conference ObjectAbstract: Different models in Information and Communication Technologies were analyzed for the creation of anPalabras claves:Matrix risks, Security Information, Security models, Telecommunications companies, vulnerabilitiesAutores:Chevez Moran M.J., Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:scopus