Mostrando 5 resultados de: 5
Filtros aplicados
Publisher
CITS 2018 - 2018 International Conference on Computer, Information and Telecommunication Systems(2)
IOP Conference Series: Materials Science and Engineering(1)
Journal of Engineering and Applied Sciences(1)
Proceedings - 2020 International Conference on Computational Science and Computational Intelligence, CSCI 2020(1)
Área temáticas
Dirección general(2)
Comunidades(1)
Existencia, conocibilidad y atributos de Dios(1)
Medicina y salud(1)
Procesos sociales(1)
Área de conocimiento
Ciencias de la computación(4)
Base de datos(1)
Red informática(1)
Tecnologías de la información y la comunicación(1)
Origen
scopus(5)
Biometric systems approach applied to a conceptual model to mitigate the integrity of the information
Conference ObjectAbstract: The security of information is important in all public or private institutions or organizations; onPalabras claves:authentication, Biometrics, identify, Integrity, security, verifyAutores:Luis Enrique Gallegos Mafia, Mayra Alejandra Mendez Anchundia, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAn approach to information security by applying a conceptual model of identities in smart cities projects
ArticleAbstract: It analyzed different projects of intelligent cities related to information security were analyzed tPalabras claves:Identity Models, INFORMATION MANAGEMENT, information security, Integrity of information, SmaJt cities, vulnerabilitiesAutores:Enrique Mafla, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAnalysis of the Appropriate Security Models to Apply in a Distributed Architecture
Conference ObjectAbstract: The availability of information generated on a large scale has allowed sharing without considering tPalabras claves:Autores:Enrique Mafla, Mendoza F., Nazareno J., Raúl Segundo Tingo Soledispa, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAlgorithms for efficient biometric systems to mitigate the integrity of a distributed database
Conference ObjectAbstract: The problems of information security are persistent in the business environment and public and privaPalabras claves:algorithm, biometric, DTW, HMM, Integrity, ORB, SIFT, SurfAutores:Alvaro Andres Coca Cruz, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusPrototype of a Model for the Alignment of Corporate Strategies and Information and Communication Technologies
Conference ObjectAbstract: Many companies have opted for the implementation of information and communication technologies (ICT)Palabras claves:business objective, Corporate Strategies, ict, Model, Strategic alignmentAutores:Arellano M.R.M.I., Lara S.N.G., Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Seis J.A.G., Trejo J.A.O.Fuentes:scopus