Mostrando 10 resultados de: 64
Filtros aplicados
Publisher
ACM International Conference Proceeding Series(11)
Advances in Science, Technology and Engineering Systems(8)
Frontiers in Artificial Intelligence and Applications(6)
Proceedings - 3rd International Conference on Information and Computer Technologies, ICICT 2020(4)
CITS 2018 - 2018 International Conference on Computer, Information and Telecommunication Systems(3)
Área temáticas
Funcionamiento de bibliotecas y archivos(21)
Programación informática, programas, datos, seguridad(20)
Administración pública(11)
Ciencias de la computación(9)
Derecho constitucional y administrativo(9)
Área de conocimiento
Ciencias de la computación(29)
Administración pública(17)
Base de datos(8)
Política pública(5)
Red informática(5)
A Blockchain Approach to Mitigate Information Security in a Public Organization for Ecuador
Conference ObjectAbstract: It was analysed in a general way and the security problem of the public organizations of Ecuador wasPalabras claves:Autores:Dario Dario Fernando Huilcapi, Enrique Mafla, Mero J., Segundo Moisés Toapanta Toapanta, Tandazo M., Trejo J.A.O.Fuentes:scopusA Homomorphic Encryption Approach in a Voting System in a Distributed Architecture
Conference ObjectAbstract: It is considered that Electronic Votes is an alternative of safer systems, which provides greater coPalabras claves:cryptogram, encryption, Homomorphic, security database, Security InformationAutores:Chávez Chalén L.J., Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:googlescopusA Hyperledger Model for the Deployment of Smart Contracts in a Public Organization in Ecuador
Conference ObjectAbstract: Were analyzed the deployment of a Smart Contract in a Public Organization in Ecuador, also were analPalabras claves:BLOCKCHAIN, HYPERLEDGER, PUBLIC ORGANIZATION, SMART CONTRACTAutores:Javier Alfredo Espinoza Carpio, Mafla Gallegos L.E., Rocio MacIel Arellano M., Segundo Moisés Toapanta ToapantaFuentes:scopusA cyber environment approach to mitigate vulnerabilities and threats in an electoral process in ecuador
Conference ObjectAbstract: The problems of information security in the cyber environment regarding vulnerabilities and threatsPalabras claves:Computer security, Cyber environment, Threats, vulnerabilitiesAutores:Luis Enrique Mafla Gallegos, Marjorie Noemi Isanoa Sinche, Segundo Moisés Toapanta ToapantaFuentes:scopusA security algorithms approach to apply to the civil registry database of the Ecuador
Conference ObjectAbstract: It was analyzed the most frequent security algorithms used for information security to mitigate thePalabras claves:Algorithm flowchart, authentication, Database, encryption, Models the security, Security InformationAutores:Antonio O., Mafla G. Enrique, Segundo Moisés Toapanta ToapantaFuentes:scopusBiometric systems approach applied to a conceptual model to mitigate the integrity of the information
Conference ObjectAbstract: The security of information is important in all public or private institutions or organizations; onPalabras claves:authentication, Biometrics, identify, Integrity, security, verifyAutores:Luis Enrique Gallegos Mafia, Mayra Alejandra Mendez Anchundia, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusBlockchain analysis applied to a process for the national public data system for Ecuador
Conference ObjectAbstract: Were analyzed the implementation of a Blockchain model for the national public data system. The probPalabras claves:BLOCKCHAIN, ETHEREUM, HYPERLEDGER, National system, Public dataAutores:Fabrizio Triviño, Mafla Gallegos L.E., Ordonez Baldeon P., Segundo Moisés Toapanta Toapanta, Trivino Trivino F.D.Fuentes:googlescopusAn approach of cyberattacks with the use of social networks and communication media for public organizations of the ecuador
Conference ObjectAbstract: An analysis was carried out of several cyber-attack methods that use Social Networks and Media as thPalabras claves:Cyber Security, Security Information, SOCIAL NETWORKSAutores:Dhilan Torres Tapia, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAn approach of efficient security algorithms for distribute architectures
Conference ObjectAbstract: We analyzed the security algorithms considered as more efficient to mitigate the vulnerabilities andPalabras claves:ALGORITHMS, Cryptography, Database, Distributed architecture, Security modelsAutores:Antonio O., Mafla G. Enrique, Segundo Moisés Toapanta ToapantaFuentes:scopusAn approach of national and international cybersecurity laws and standards to mitigate information risks in public organizations of ecuador
Conference ObjectAbstract: Today, cybersecurity is very important, and Ecuador could suffer serious security problems that woulPalabras claves:CYBERSECURITY, INFORMATION, laws, risks, security of the information, StandardsAutores:Alexander Jimenez Gurumendi, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopus