Mostrando 10 resultados de: 47
Publisher
ACM International Conference Proceeding Series(8)
Advances in Science, Technology and Engineering Systems(6)
Proceedings - 3rd International Conference on Information and Computer Technologies, ICICT 2020(6)
Frontiers in Artificial Intelligence and Applications(5)
Proceedings - 2019 2nd International Conference on Safety Produce Informatization, IICSPI 2019(2)
Área temáticas
Programación informática, programas, datos, seguridad(17)
Funcionamiento de bibliotecas y archivos(13)
Dirección general(12)
Derecho constitucional y administrativo(8)
El proceso político(8)
Área de conocimiento
Ciencias de la computación(21)
Administración pública(12)
Base de datos(7)
Política pública(4)
Gestión(3)
A Homomorphic Encryption Approach in a Voting System in a Distributed Architecture
Conference ObjectAbstract: It is considered that Electronic Votes is an alternative of safer systems, which provides greater coPalabras claves:cryptogram, encryption, Homomorphic, security database, Security InformationAutores:Chávez Chalén L.J., Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:googlescopusA cyber environment approach to mitigate vulnerabilities and threats in an electoral process in ecuador
Conference ObjectAbstract: The problems of information security in the cyber environment regarding vulnerabilities and threatsPalabras claves:Computer security, Cyber environment, Threats, vulnerabilitiesAutores:Luis Enrique Mafla Gallegos, Marjorie Noemi Isanoa Sinche, Segundo Moisés Toapanta ToapantaFuentes:scopusA hyperledger technology approach to mitigate the risks of the database in foreign trade management
Conference ObjectAbstract: It was analyzed blockchain proposals such as architectures and models applied in different areas whiPalabras claves:BLOCKCHAIN, Decentralized model, foreign trade, HYPERLEDGER, Mitigate the risksAutores:Guaman Villalta M.G., Mafla Gallegos L.E., Saltos N.S.M., Segundo Moisés Toapanta ToapantaFuentes:scopusA security algorithms approach to apply to the civil registry database of the Ecuador
Conference ObjectAbstract: It was analyzed the most frequent security algorithms used for information security to mitigate thePalabras claves:Algorithm flowchart, authentication, Database, encryption, Models the security, Security InformationAutores:Antonio O., Mafla G. Enrique, Segundo Moisés Toapanta ToapantaFuentes:scopusBlockchain analysis applied to a process for the national public data system for Ecuador
Conference ObjectAbstract: Were analyzed the implementation of a Blockchain model for the national public data system. The probPalabras claves:BLOCKCHAIN, ETHEREUM, HYPERLEDGER, National system, Public dataAutores:Fabrizio Triviño, Mafla Gallegos L.E., Ordonez Baldeon P., Segundo Moisés Toapanta Toapanta, Trivino Trivino F.D.Fuentes:googlescopusAn approach of cyberattacks with the use of social networks and communication media for public organizations of the ecuador
Conference ObjectAbstract: An analysis was carried out of several cyber-attack methods that use Social Networks and Media as thPalabras claves:Cyber Security, Security Information, SOCIAL NETWORKSAutores:Dhilan Torres Tapia, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAn approach of models of information technologies suitable to optimize management in a public organization of Ecuador
Conference ObjectAbstract: Public institutions in Ecuador have problems to optimize the management of ICT in an appropriate andPalabras claves:Appropriate Models, Implementation of ICTs, management, Optimization of IT resources, PROCESS, Public Institutions of EcuadorAutores:Danny Wilfrido Barona Valencia, Luis Enrique Mafla Gallegos, Melania Alejandra Prado Sánchez, Segundo Moisés Toapanta ToapantaFuentes:scopusAn approach of national and international cybersecurity laws and standards to mitigate information risks in public organizations of ecuador
Conference ObjectAbstract: Today, cybersecurity is very important, and Ecuador could suffer serious security problems that woulPalabras claves:CYBERSECURITY, INFORMATION, laws, risks, security of the information, StandardsAutores:Alexander Jimenez Gurumendi, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAn approach to vulnerabilities, threats and risk in voting systems for popular elections in Latin America
ArticleAbstract: The problems in information security regarding vulnerabilities, threats and risks in voting systemsPalabras claves:e-voting, ELECTIONS, Latin America, VotingAutores:Félix Gustavo Mendoza Quimí, Iván Fernando Marriott Saá, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAn immutable algorithm approach to improve the information security of a process for a public organization of Ecuador
ArticleAbstract: Currently, information security is among the main characteristics that must be achieved within the sPalabras claves:ALGORITHMS, Cryptography, securityAutores:Andrés Javier Bravo Jácome, Luis Enrique Mafla Gallegos, Máximo Giovani Tandazo Espinoza, Segundo Moisés Toapanta ToapantaFuentes:scopus