{"id":"https://openalex.org/W3130911349","doi":"https://doi.org/10.1109/accc51160.2020.9347892","title":"Evaluation of Algorithms and Security Protocols to Mitigate the Risks in Commercial Transactions carried out by Public Companies","display_name":"Evaluation of Algorithms and Security Protocols to Mitigate the Risks in Commercial Transactions carried out by Public Companies","publication_year":2020,"publication_date":"2020-09-18","ids":{"openalex":"https://openalex.org/W3130911349","doi":"https://doi.org/10.1109/accc51160.2020.9347892","mag":"3130911349"},"language":"en","primary_location":{"id":"doi:10.1109/accc51160.2020.9347892","is_oa":false,"landing_page_url":"https://doi.org/10.1109/accc51160.2020.9347892","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Asia Conference on Computers and Communications (ACCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016709650","display_name":"Segundo Mois\u00e9s Toapanta Toapanta","orcid":"https://orcid.org/0000-0002-9041-0518"},"institutions":[{"id":"https://openalex.org/I4210162086","display_name":"Institute of World Economics","ror":"https://ror.org/05e7k4575","country_code":"HU","type":"facility","lineage":["https://openalex.org/I4210155320","https://openalex.org/I4210162086","https://openalex.org/I4387152226"]},{"id":"https://openalex.org/I4210107574","display_name":"School of Business and Management","ror":"https://ror.org/01e2adt21","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210107574"]}],"countries":["FR","HU"],"is_corresponding":true,"raw_author_name":"Segundo Moises Toapanta Toapanta","raw_affiliation_strings":["Information Technology Consultant, Management of Technologies for the World (GTM),Quito,Ecuador","Information Technology Consultant, Management of Technologies for the World (GTM), Quito, Ecuador"],"affiliations":[{"raw_affiliation_string":"Information Technology Consultant, Management of Technologies for the World (GTM),Quito,Ecuador","institution_ids":["https://openalex.org/I4210162086"]},{"raw_affiliation_string":"Information Technology Consultant, Management of Technologies for the World (GTM), Quito, Ecuador","institution_ids":["https://openalex.org/I4210107574"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082456719","display_name":"Luis Enrique Mafla Gallegos","orcid":"https://orcid.org/0000-0002-7808-7738"},"institutions":[{"id":"https://openalex.org/I4210104854","display_name":"National Polytechnic School","ror":null,"country_code":"EC","type":null,"lineage":["https://openalex.org/I4210104854"]},{"id":"https://openalex.org/I70764802","display_name":"National Polytechnic School","ror":"https://ror.org/01gb99w41","country_code":"EC","type":"education","lineage":["https://openalex.org/I70764802"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Luis Enrique Mafla Gallegos","raw_affiliation_strings":["National Polytechnic School (EPN),Faculty of System Engineering,Quito,Ecuador","Faculty of System Engineering, National Polytechnic School (EPN), Quito, Ecuador"],"affiliations":[{"raw_affiliation_string":"National Polytechnic School (EPN),Faculty of System Engineering,Quito,Ecuador","institution_ids":["https://openalex.org/I4210104854"]},{"raw_affiliation_string":"Faculty of System Engineering, National Polytechnic School (EPN), Quito, Ecuador","institution_ids":["https://openalex.org/I70764802"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061876499","display_name":"Alex Enrique Aranda Alvarado","orcid":null},"institutions":[{"id":"https://openalex.org/I3132940433","display_name":"Politecnica Salesiana University","ror":"https://ror.org/00f11af73","country_code":"EC","type":"education","lineage":["https://openalex.org/I3132940433"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Alex Enrique Aranda Alvarado","raw_affiliation_strings":["Universidad Polit\u00e9cnica Salesiana (UPS),Department of Computer Science,Guayaquil,Ecuador"],"affiliations":[{"raw_affiliation_string":"Universidad Polit\u00e9cnica Salesiana (UPS),Department of Computer Science,Guayaquil,Ecuador","institution_ids":["https://openalex.org/I3132940433"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028482487","display_name":"M\u00e1ximo Prado Sol\u00eds","orcid":"https://orcid.org/0000-0001-5967-8842"},"institutions":[{"id":"https://openalex.org/I4210099155","display_name":"Universidad T\u00e9cnica Luis Vargas Torres","ror":"https://ror.org/010w4rs44","country_code":"EC","type":"education","lineage":["https://openalex.org/I4210099155"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Maximo Prado Solis","raw_affiliation_strings":["Universidad T\u00e9cnica Luis Vargas Torres de Esmeraldas,Career Social Sciences,Esmeraldas,Ecuador"],"affiliations":[{"raw_affiliation_string":"Universidad T\u00e9cnica Luis Vargas Torres de Esmeraldas,Career Social Sciences,Esmeraldas,Ecuador","institution_ids":["https://openalex.org/I4210099155"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5016709650"],"corresponding_institution_ids":["https://openalex.org/I4210107574","https://openalex.org/I4210162086"],"apc_list":null,"apc_paid":null,"fwci":0.2669,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.69403586,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"96","last_page":"103"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9147999882698059,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9147999882698059,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7506698369979858},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7220742106437683},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.6911647915840149},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5664975643157959},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5404945015907288},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5313532948493958},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5162932276725769},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5054759979248047},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.47462451457977295},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.45769673585891724},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.4220009446144104},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3438956141471863},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.33567023277282715}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7506698369979858},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7220742106437683},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.6911647915840149},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5664975643157959},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5404945015907288},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5313532948493958},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5162932276725769},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5054759979248047},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.47462451457977295},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.45769673585891724},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.4220009446144104},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3438956141471863},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.33567023277282715},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/accc51160.2020.9347892","is_oa":false,"landing_page_url":"https://doi.org/10.1109/accc51160.2020.9347892","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Asia Conference on Computers and Communications (ACCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.800000011920929,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2098246374","https://openalex.org/W2348322870","https://openalex.org/W2396511550","https://openalex.org/W2484349649","https://openalex.org/W2597564129","https://openalex.org/W2730809413","https://openalex.org/W2745683417","https://openalex.org/W2773978442","https://openalex.org/W2789395307","https://openalex.org/W2806378942","https://openalex.org/W2891611708","https://openalex.org/W2913511931","https://openalex.org/W2918832131","https://openalex.org/W2970236710","https://openalex.org/W2977486517","https://openalex.org/W3006232415","https://openalex.org/W3012217003","https://openalex.org/W3015644726","https://openalex.org/W3020268494","https://openalex.org/W3021642540","https://openalex.org/W3024941839","https://openalex.org/W3025610854","https://openalex.org/W3031182297","https://openalex.org/W4243741838","https://openalex.org/W4244057012","https://openalex.org/W4255061013"],"related_works":["https://openalex.org/W815057058","https://openalex.org/W2497647994","https://openalex.org/W2398630588","https://openalex.org/W4243161579","https://openalex.org/W4243404954","https://openalex.org/W2399025821","https://openalex.org/W3195449469","https://openalex.org/W1988974780","https://openalex.org/W2039256135","https://openalex.org/W2612088164"],"abstract_inverted_index":{"The":[0,14],"security":[1,22,83,97,147],"problems":[2],"in":[3,6,11,74,92,129,144,157],"electronic":[4],"commerce":[5],"transactions":[7,33],"are":[8],"very":[9],"evident":[10],"public":[12,88,111,158],"companies.":[13,89],"objective":[15],"of":[16,66,87,95,114,154],"this":[17],"research":[18,48],"is":[19,141],"to":[20,26,51,84,107,148],"analyze":[21,52],"algorithms":[23,69,104,128],"and":[24,29,46,59,68,77,98,109,118,121,152],"protocols":[25,67],"mitigate":[27,149],"risks":[28,153],"vulnerabilities":[30],"within":[31,131],"commercial":[32,115],"that":[34,70,137],"help":[35],"us":[36],"identify":[37],"computer":[38],"attacks,":[39],"whether":[40],"internal":[41],"or":[42],"external.":[43],"Deductive":[44],"method":[45],"exploratory":[47],"were":[49],"used":[50],"the":[53,56,72,81,85,96,122,127,132,138,142],"information":[54,60,73,86],"from":[55],"reference":[57],"articles":[58],"available":[61],"online;":[62],"regarding":[63],"different":[64],"types":[65],"protect":[71],"its":[75,155],"entirety":[76],"confidentiality,":[78],"thus":[79],"providing":[80],"respective":[82],"It":[90,134],"resulted":[91],"a":[93],"control":[94],"privacy":[99],"factors,":[100],"by":[101],"having":[102],"RSA":[103],"with":[105],"formulas":[106],"encrypt":[108],"decrypt":[110],"keys,":[112],"combinations":[113],"transactions,":[116],"asymmetric":[117],"symmetric":[119],"cryptography":[120],"SET":[123,139],"protocol,":[124],"which":[125],"facilitates":[126],"decision-making":[130],"organizations.":[133,159],"was":[135],"concluded":[136],"protocol":[140],"best":[143],"facilitating":[145],"greater":[146],"vulnerabilities,":[150],"threats":[151],"processes":[156]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
