1
tesis de maestría
Publicado 2016
Enlace
Enlace
El objetivo de la investigación es determinar si el uso del conjunto de aplicaciones de Google Apps mejora la comunicación interna entre miembros de la comunidad universitaria de la UNSAAC. La investigación utiliza el diseño de investigación cuasi experimental, con posprueba, con grupo de comparación. La población de estudio estuvo constituida por más de 14700 integrantes de la comunidad universitaria entre profesores, personal administrativo y estudiantes, el grupo experimental estuvo conformado por 152 participantes y el grupo control por 212 participantes. Las variables estudiadas fueron comunicación interna y uso del Software como Servicio Google Apps. En la investigación se formuló una hipótesis general y tres hipótesis específicas. Los resultados de la investigación indican que se mantiene el flujo de mensajes como unidireccional y la claridad o comprensión es relat...
2
tesis doctoral
Publicado 2019
Enlace
Enlace
El objetivo de la investigación es determinar en qué medida la implementación de un nuevo modelo de servicio computacional que extiende las funcionalidades de un Software como servicio (SaaS) mejora la Comunicación Interna de la Universidad Nacional de San Antonio Abad del Cusco (UNSAAC). La investigación utiliza el diseño cuasi-experimental con estrategia longitudinal con Pre-Test y Post-Test con un solo grupo no aleatorio. Así mismo, la población de estudio corresponde a 14000 integrantes entre profesores, personal administrativo y estudiantes. En la etapa Pre-Test se entrevistó a 368 integrantes y en la etapa Post-Test a 652 integrantes. Por otro lado, las variables estudiadas fueron comunicación interna universitaria y modelo de servicio computacional basado en la arquitectura de Software como Servicio. Los resultados de la investigación indican que la comunicación intern...
3
artículo
The accelerated growth in exploiting vulnerabilities due to errors or failures in the software development process is a latent concern in the Software Industry. In this sense, this study aims to provide an overview of the Secure Software Development trends to help identify topics that have been extensively studied and those that still need to be. Therefore, in this paper, a systematic mapping review with PICo search strategies was conducted. A total of 867 papers were identified, of which only 528 papers were selected for this review. The main findings correspond to the Software Requirements Security, where the Elicitation and Misuse Cases reported more frequently. In Software Design Security, recurring themes are security in component-based software development, threat model, and security patterns. In the Software Construction Security, the most frequent topics are static code analysis ...
4
artículo
Publicado 2024
Enlace
Enlace
The imminent arrival of quantum computing has accelerated the need for cryptographic systems resistant to quantum attacks. Such attacks exploit the vulnerability in private and public key encryption systems, where the public key is derived from the private key, which could be refactored from the public key. To address this issue, the National Institute of Standards and Technology (NIST) launched a global competition in 2016 to create quantum-resistant algorithms. CRYSTALS-Kyber, a lattice-based algorithm focused on the learning with errors (LWE) problem, was selected for standardization. This work introduces RKyber, a variant that instead targets the learning with rounding (LWR) problem, simplifying computations by using deterministic errors rather than random noise. Both algorithms were executed 1000 times, showing that RKyber offers improved speed at the cost of some security.
5
artículo
Publicado 2024
Enlace
Enlace
The imminent arrival of quantum computing has accelerated the need for cryptographic systems resistant to quantum attacks. Such attacks exploit the vulnerability in private and public key encryption systems, where the public key is derived from the private key, which could be refactored from the public key. To address this issue, the National Institute of Standards and Technology (NIST) launched a global competition in 2016 to create quantum-resistant algorithms. CRYSTALS-Kyber, a lattice-based algorithm focused on the learning with errors (LWE) problem, was selected for standardization. This work introduces RKyber, a variant that instead targets the learning with rounding (LWR) problem, simplifying computations by using deterministic errors rather than random noise. Both algorithms were executed 1000 times, showing that RKyber offers improved speed at the cost of some security.