Mostrando 10 resultados de: 76
Filtros aplicados
Publisher
ACM International Conference Proceeding Series(10)
Advances in Science, Technology and Engineering Systems(9)
Proceedings - 3rd International Conference on Information and Computer Technologies, ICICT 2020(8)
Frontiers in Artificial Intelligence and Applications(7)
Proceedings of the 3rd World Conference on Smart Trends in Systems, Security and Sustainability, WorldS4 2019(6)
Área temáticas
Programación informática, programas, datos, seguridad(25)
Funcionamiento de bibliotecas y archivos(23)
Dirección general(16)
Ciencias de la computación(13)
Administración pública(11)
Área de conocimiento
Ciencias de la computación(36)
Administración pública(18)
Base de datos(10)
Política pública(5)
Red informática(5)
A Blockchain Approach to Mitigate Information Security in a Public Organization for Ecuador
Conference ObjectAbstract: It was analysed in a general way and the security problem of the public organizations of Ecuador wasPalabras claves:Autores:Dario Dario Fernando Huilcapi, Enrique Mafla, Mero J., Segundo Moisés Toapanta Toapanta, Tandazo M., Trejo J.A.O.Fuentes:scopusA Homomorphic Encryption Approach in a Voting System in a Distributed Architecture
Conference ObjectAbstract: It is considered that Electronic Votes is an alternative of safer systems, which provides greater coPalabras claves:cryptogram, encryption, Homomorphic, security database, Security InformationAutores:Chávez Chalén L.J., Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:googlescopusA Hyperledger Model for the Deployment of Smart Contracts in a Public Organization in Ecuador
Conference ObjectAbstract: Were analyzed the deployment of a Smart Contract in a Public Organization in Ecuador, also were analPalabras claves:BLOCKCHAIN, HYPERLEDGER, PUBLIC ORGANIZATION, SMART CONTRACTAutores:Javier Alfredo Espinoza Carpio, Mafla Gallegos L.E., Rocio MacIel Arellano M., Segundo Moisés Toapanta ToapantaFuentes:scopusA cyber environment approach to mitigate vulnerabilities and threats in an electoral process in ecuador
Conference ObjectAbstract: The problems of information security in the cyber environment regarding vulnerabilities and threatsPalabras claves:Computer security, Cyber environment, Threats, vulnerabilitiesAutores:Luis Enrique Mafla Gallegos, Marjorie Noemi Isanoa Sinche, Segundo Moisés Toapanta ToapantaFuentes:scopusA hyperledger technology approach to mitigate the risks of the database in foreign trade management
Conference ObjectAbstract: It was analyzed blockchain proposals such as architectures and models applied in different areas whiPalabras claves:BLOCKCHAIN, Decentralized model, foreign trade, HYPERLEDGER, Mitigate the risksAutores:Guaman Villalta M.G., Mafla Gallegos L.E., Saltos N.S.M., Segundo Moisés Toapanta ToapantaFuentes:scopusA security algorithms approach to apply to the civil registry database of the Ecuador
Conference ObjectAbstract: It was analyzed the most frequent security algorithms used for information security to mitigate thePalabras claves:Algorithm flowchart, authentication, Database, encryption, Models the security, Security InformationAutores:Antonio O., Mafla G. Enrique, Segundo Moisés Toapanta ToapantaFuentes:scopusBiometric systems approach applied to a conceptual model to mitigate the integrity of the information
Conference ObjectAbstract: The security of information is important in all public or private institutions or organizations; onPalabras claves:authentication, Biometrics, identify, Integrity, security, verifyAutores:Luis Enrique Gallegos Mafia, Mayra Alejandra Mendez Anchundia, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusBlockchain analysis applied to a process for the national public data system for Ecuador
Conference ObjectAbstract: Were analyzed the implementation of a Blockchain model for the national public data system. The probPalabras claves:BLOCKCHAIN, ETHEREUM, HYPERLEDGER, National system, Public dataAutores:Fabrizio Triviño, Mafla Gallegos L.E., Ordonez Baldeon P., Segundo Moisés Toapanta Toapanta, Trivino Trivino F.D.Fuentes:googlescopusAn approach of cyberattacks with the use of social networks and communication media for public organizations of the ecuador
Conference ObjectAbstract: An analysis was carried out of several cyber-attack methods that use Social Networks and Media as thPalabras claves:Cyber Security, Security Information, SOCIAL NETWORKSAutores:Dhilan Torres Tapia, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAn approach of efficient security algorithms for distribute architectures
Conference ObjectAbstract: We analyzed the security algorithms considered as more efficient to mitigate the vulnerabilities andPalabras claves:ALGORITHMS, Cryptography, Database, Distributed architecture, Security modelsAutores:Antonio O., Mafla G. Enrique, Segundo Moisés Toapanta ToapantaFuentes:scopus