Mostrando 3 resultados de: 3
Filtros aplicados
Subtipo de publicación
Conference Object(3)
Publisher
2016 3rd International Conference on eDemocracy and eGovernment, ICEDEG 2016(2)
Advances in Intelligent Systems and Computing(1)
Área temáticas
Ciencias de la computación(3)
Dirección general(1)
Funcionamiento de bibliotecas y archivos(1)
Procesos sociales(1)
Programación informática, programas, datos, seguridad(1)
Año de Publicación
2016(3)
Encryption techniques: A theoretical overview and future proposals
Conference ObjectAbstract: The usage of encrypted messages has a long history. Today, however, we are able to maintain the secuPalabras claves:ciphered, Cryptography, encryption, Password, secureAutores:A. Hector F. Gomez, H. Gomez Alvarado, Hernando Buenaño, R. Correa Quezada, Ronny Correa-Quezada, S. Arias Tapia, Sánchez Guerrero Javier, Susana AriasFuentes:googlerraaescopusImplementation of techniques, standards and safety recommendations to prevent XSS and SQL injection attacks in Java EE RESTful applications
Conference ObjectAbstract: There are recommendations and tools, given by OWASP that suggest basic techniques of prevention andPalabras claves:OWASP, REST, SQL injection, XSSAutores:D Jaramillo Hurtado, D. Guaman Coronel, Daniel Alejandro Guaman Coronel, Daniel Guamán, Danilo Jaramillo Hurtado, F. Guaman Bastidas, Franco Guamán, R. Correa Quezada, Roddy A. Correa, Roddy Andrés Correa TenesacaFuentes:googlerraaescopusInternet business: Its origins, theoretical issues and its applications
Conference ObjectAbstract: Companies in the 21st century should adapt their business models so that they can operate via the InPalabras claves:E-Commerce, e-strategies, Information technology, internet, transactions onlineAutores:A. Hector F. Gomez, H. Gomez Alvarado, Hernando Buenaño, R. Correa Quezada, Ronny Correa-Quezada, Sánchez Guerrero Javier, Victor Hernandez DelSaltoFuentes:rraaescopus