As part of the standardization activities in GoIT, we attended to the plenary meeting of of CEN-CLC/JTC 13 ‘Cybersecurity and
Read MoreCybersecurity through Openness Although in many occasions the protection of information systems is achieved by implementing obscure procedures, the proper
Read MoreIngeniero Junior para el desarrollo de protocolos criptográficos post-cuánticos en gemelos digitales
Desarrollo de protocolos criptográficos post-cuánticos para creación de canales confidenciales autenticados en sistemas de gemelos digitales
Read More