Mostrando 10 resultados de: 21
Filtros aplicados
Publisher
Proceedings - 3rd International Conference on Information and Computer Technologies, ICICT 2020(8)
2020 Congreso Internacional de Innovacion y Tendencias en Ingenieria, CONIITI 2020 - Conference Proceedings(2)
Frontiers in Artificial Intelligence and Applications(2)
Proceedings - 2019 International Conference on Artificial Intelligence and Advanced Manufacturing, AIAM 2019(2)
Proceedings of 2020 IEEE International Conference on Power, Intelligent Computing and Systems, ICPICS 2020(2)
Área temáticas
Programación informática, programas, datos, seguridad(11)
Dirección general(6)
Funcionamiento de bibliotecas y archivos(4)
Ciencias de la computación(3)
Economía financiera(3)
Área de conocimiento
Ciencias de la computación(12)
Administración pública(4)
Base de datos(3)
Gestión(3)
Algoritmo(1)
Origen
google(6)
Blockchain analysis applied to a process for the national public data system for Ecuador
Conference ObjectAbstract: Were analyzed the implementation of a Blockchain model for the national public data system. The probPalabras claves:BLOCKCHAIN, ETHEREUM, HYPERLEDGER, National system, Public dataAutores:Fabrizio Triviño, Mafla Gallegos L.E., Ordonez Baldeon P., Segundo Moisés Toapanta Toapanta, Trivino Trivino F.D.Fuentes:googlescopusAnalysis Cryptographic for Electronic Votes in Systems of Distributed Architectures
Conference ObjectAbstract: It was considered that electronic voting is revolutionary around the world because of the new technoPalabras claves:ballots, Cryptography, Electronic voting, privacy, security, Smartmatic, voting platformAutores:Danny Wilfrido Barona Valencia, Mafla Gallegos L.E., Orellana Velez N.V., Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis for the evaluation and security management of a database in a public organization to mitigate cyber attacks
ArticleAbstract: In data handling, security and privacy are essential for database administrators and users that ownPalabras claves:BLOCKCHAIN, Cyber attacks, Cyber Security, Data Base, PUBLIC ORGANIZATIONAutores:Escalante Quimis O.A., Maciel Arellano M.R., Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of Security Algorithms for a Distributed Database
Conference ObjectAbstract: We analyzed the security of a database considering the environment of distributed systems, there arePalabras claves:algorithm flowcharts, data security, distributed database, security algorithms, security of the informationAutores:Daniel Humberto Plua Moran, Félix Gustavo Mendoza Quimí, Maciel Arellano M.R., Mafla Gallegos L.E., Máximo Giovani Tandazo Espinoza, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of models of security to mitigate the risks, vulnerabilities and threats in a company of services of telecommunications
Conference ObjectAbstract: Different models in Information and Communication Technologies were analyzed for the creation of anPalabras claves:Matrix risks, Security Information, Security models, Telecommunications companies, vulnerabilitiesAutores:Chevez Moran M.J., Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of new technologies in information security to mitigate data risks in a public organization
Conference ObjectAbstract: Were analyzed references on alternative technologies or new proposals to help mitigate data risks. TPalabras claves:foreign trade, information security, Mitigate the risks, New TechnologiesAutores:Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Medina Lara M.D., Segundo Moisés Toapanta ToapantaFuentes:googlescopusAnalysis of security mechanisms to mitigate hacker attacks to improve e-commerce management in Ecuador
Conference ObjectAbstract: The problem that was chosen for the elaboration of this scientific article, is the distrust on the pPalabras claves:Cyber attacks, electronic commerce, ETHICAL HACKING, Multi-factor authentication, vulnerabilityAutores:Bertha Alice Naranjo Sanchez, Bertha Naranjo Sanchez, Mafla Gallegos L.E., Mera Caicedo H.A., Segundo Moisés Toapanta ToapantaFuentes:googlescopusAnalysis of the legal basis to mitigate cyberbullying in social networks in Ecuador
Conference ObjectAbstract: Cyberbullying is a critical issue in society worldwide, however in Ecuador is not given necessary imPalabras claves:CYBERBULLYING, laws, mitigation, Risk, SOCIAL NETWORKSAutores:Mafla Gallegos L.E., Segundo Moisés Toapanta Toapanta, Tacuri López I.L.Fuentes:scopusAnalysis to pbkp_redict cybercrime using information technology in a globalized environment
Conference ObjectAbstract: Today, IT plays a key role in the information-intensive global economy. The application of computersPalabras claves:Data Mining, Decision trees introduction, Information Technologies, Pbkp_redictAutores:Cisnero Andrade B.E., Mafla Gallegos L.E., Máximo Giovani Tandazo Espinoza, Segundo Moisés Toapanta ToapantaFuentes:scopusA Homomorphic Encryption Approach in a Voting System in a Distributed Architecture
Conference ObjectAbstract: It is considered that Electronic Votes is an alternative of safer systems, which provides greater coPalabras claves:cryptogram, encryption, Homomorphic, security database, Security InformationAutores:Chávez Chalén L.J., Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:googlescopus