Daniel Alejandro Maldonado Ruiz | Escuela Politécnica Nacional (original) (raw)

Daniel Alejandro Maldonado Ruiz

Uploads

Papers by Daniel Alejandro Maldonado Ruiz

Research paper thumbnail of NestedChain: “Blockchain-inside-a-Blockchain” new generation prototype

Annals of telecommunications/Annales des télécommunications, Apr 4, 2024

Research paper thumbnail of Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection

Zenodo (CERN European Organization for Nuclear Research), Jul 2, 2019

Research paper thumbnail of Fundamentals of Blockchain Technology

Springer eBooks, Jul 4, 2022

Research paper thumbnail of An Innovative and Decentralized Identity Framework Based on Blockchain Technology

2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

Research paper thumbnail of Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection

The new generation of security threats has beenpromoted by digital currencies and real-time appli... more The new generation of security threats has beenpromoted by digital currencies and real-time applications, whereall users develop new ways to communicate on the Internet.Security has evolved in the need of privacy and anonymity forall users and his portable devices. New technologies in everyfield prove that users need security features integrated into theircommunication applications, parallel systems for mobile devices,internet, and identity management. This review presents the keyconcepts of the main areas in computer security and how it hasevolved in the last years. This work focuses on cryptography,user authentication, denial of service attacks, intrusion detectionand firewalls.

Research paper thumbnail of Current Trends in Blockchain Implementations on the Paradigm of Public Key Infrastructure: A Survey

Research paper thumbnail of Vulnerabilidades del uso de correo electrónico y desafíos de seguridad para su implementación futura

Research paper thumbnail of Secure and Internet-Less Connectivity to a Blockchain Network for Limited Connectivity Bank Users

Research paper thumbnail of Desafíos sobre las nuevas tecnologías de resolución de CAPTCHA

Since the development of computer systems, it becomes necessary to differentiate the responses ca... more Since the development of computer systems, it becomes necessary to differentiate the responses came from both a computer system as a person, so that one cannot replace the other in environments where only one person should use, which was made through CAPTCHA, which is an efficient arrangement from the cryptographic viewpoint, but it has found several issues with the new systems of Artificial Intelligence. This Paper includes a brief theoretical analysis of the reasons for their use from the cryptography viewpoint, the evolution of the system in its presentation for the users, focusing on the strongest CAPTCHA in the market. Additionally, a review of the technology that has allowed to break the system at certain level and the evolution of Artificial Intelligence systems in the medium term could defeat CAPTCHA; to finally make recommendations on how to design and maintain a strong CAPTCHA at short and medium term against the evolution of technology and what kind of features should hav...

Research paper thumbnail of A Proposal for an Improved Distributed Architecture for OpenPGP's Web of Trust

2018 International Conference on Computational Science and Computational Intelligence (CSCI), 2018

Security and authenticity issues were never considered when e-mail was originally designed and im... more Security and authenticity issues were never considered when e-mail was originally designed and implemented. Along the time, most of electronic mails have been sent between users in a way that any user, intended or not, could read the message or impersonate a sender. To resolve all these issues and maintain the privacy of e-mails was the reason for the creation of PGP and its complements. However, over the years, PGP revealed unexpected security issues when faced to mistrusted environments where we do not know if someone is who claims to be. To overcome this problem, we propose a trust solution for OpenPGP that improves trust relationships between users and the public key distribution network. Our proposal could be implemented in a system using cryptographic technology efficiently in OpenPGP over an all-new trust approach.

Research paper thumbnail of 3BI-ECC: a Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography

2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 2020

Research paper thumbnail of Diseño e implementación de una red de telefonía IP mediante Asterisk, con función de Voicemail y transferencia de llamadas y desarrollo de políticas de seguridad y manual de usuario del sistema para SACMIS Cía. Ltda

Research paper thumbnail of Diseño e implementación de una red de telefonía IP mediante Asterisk, con función de Voicemail y transferencia de llamadas y desarrollo de políticas de seguridad y manual de usuario del sistema para SACMIS Cía. Ltda

Research paper thumbnail of NestedChain: “Blockchain-inside-a-Blockchain” new generation prototype

Annals of telecommunications/Annales des télécommunications, Apr 4, 2024

Research paper thumbnail of Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection

Zenodo (CERN European Organization for Nuclear Research), Jul 2, 2019

Research paper thumbnail of Fundamentals of Blockchain Technology

Springer eBooks, Jul 4, 2022

Research paper thumbnail of An Innovative and Decentralized Identity Framework Based on Blockchain Technology

2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

Research paper thumbnail of Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection

The new generation of security threats has beenpromoted by digital currencies and real-time appli... more The new generation of security threats has beenpromoted by digital currencies and real-time applications, whereall users develop new ways to communicate on the Internet.Security has evolved in the need of privacy and anonymity forall users and his portable devices. New technologies in everyfield prove that users need security features integrated into theircommunication applications, parallel systems for mobile devices,internet, and identity management. This review presents the keyconcepts of the main areas in computer security and how it hasevolved in the last years. This work focuses on cryptography,user authentication, denial of service attacks, intrusion detectionand firewalls.

Research paper thumbnail of Current Trends in Blockchain Implementations on the Paradigm of Public Key Infrastructure: A Survey

Research paper thumbnail of Vulnerabilidades del uso de correo electrónico y desafíos de seguridad para su implementación futura

Research paper thumbnail of Secure and Internet-Less Connectivity to a Blockchain Network for Limited Connectivity Bank Users

Research paper thumbnail of Desafíos sobre las nuevas tecnologías de resolución de CAPTCHA

Since the development of computer systems, it becomes necessary to differentiate the responses ca... more Since the development of computer systems, it becomes necessary to differentiate the responses came from both a computer system as a person, so that one cannot replace the other in environments where only one person should use, which was made through CAPTCHA, which is an efficient arrangement from the cryptographic viewpoint, but it has found several issues with the new systems of Artificial Intelligence. This Paper includes a brief theoretical analysis of the reasons for their use from the cryptography viewpoint, the evolution of the system in its presentation for the users, focusing on the strongest CAPTCHA in the market. Additionally, a review of the technology that has allowed to break the system at certain level and the evolution of Artificial Intelligence systems in the medium term could defeat CAPTCHA; to finally make recommendations on how to design and maintain a strong CAPTCHA at short and medium term against the evolution of technology and what kind of features should hav...

Research paper thumbnail of A Proposal for an Improved Distributed Architecture for OpenPGP's Web of Trust

2018 International Conference on Computational Science and Computational Intelligence (CSCI), 2018

Security and authenticity issues were never considered when e-mail was originally designed and im... more Security and authenticity issues were never considered when e-mail was originally designed and implemented. Along the time, most of electronic mails have been sent between users in a way that any user, intended or not, could read the message or impersonate a sender. To resolve all these issues and maintain the privacy of e-mails was the reason for the creation of PGP and its complements. However, over the years, PGP revealed unexpected security issues when faced to mistrusted environments where we do not know if someone is who claims to be. To overcome this problem, we propose a trust solution for OpenPGP that improves trust relationships between users and the public key distribution network. Our proposal could be implemented in a system using cryptographic technology efficiently in OpenPGP over an all-new trust approach.

Research paper thumbnail of 3BI-ECC: a Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography

2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 2020

Research paper thumbnail of Diseño e implementación de una red de telefonía IP mediante Asterisk, con función de Voicemail y transferencia de llamadas y desarrollo de políticas de seguridad y manual de usuario del sistema para SACMIS Cía. Ltda

Research paper thumbnail of Diseño e implementación de una red de telefonía IP mediante Asterisk, con función de Voicemail y transferencia de llamadas y desarrollo de políticas de seguridad y manual de usuario del sistema para SACMIS Cía. Ltda

Log In