Buscar
Mostrando ítems 1-10 de 2016
Secure Architectures for a Three-Stage Polling Place Electronic Voting System
(Revista Computación y Sistemas; Vol. 16 No. 1, 2012-03-15)
Abstract. Security on electronic voting systems is
fundamental; it must assure the integrity of all the
elements involved or generated during a voting
process. This paper presents a design of secure
architectures for ...
Elaboración de un tutorial para la construcción de una red virtual privada (VPN)
(Universidad del Azuay, 2013)
Proposed Model to Implement High-Level Information Security in Internet of Things
(Ieee, 2017-01-01)
Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the ...
Proposed model to implement high-level Information Security in Internet of Things
(2017-06-12)
Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the ...
A New Mail System for Secure Data Transmission in Cyber Physical Systems
This paper provides a complete study on email requirements, with special emphasis on its security aspects and architecture. It explores how current protocols have evolved, the environment in which they have been developed ...
Secure Inter-cloud Architecture For Virtual Cloud Computing Based On Hybrid Ip And Mpls Infrastructure Solution
(IEEE-Inst Electrical Electronics Engineers IncPiscataway, 2016)