Search


Current filters:

Start a new search
Add filters:

Use filters to refine the search results.


Results 11-18 of 18 (Search time: 0.003 seconds).
Item hits:
Issue DateTitleAuthor(s)
2011-11A Reliable and Secure Distributed In-Network Data Storage Scheme in Wireless Sensor NetworksAbdullahi, Muhammad Bashir; Wang, Guojun; Musau, Felix
2012-05Secure Publish-Subscribe-based In-Network Data Storage Service in Wireless Sensor NetworksAbdullahi, Muhammad Bashir; Wang, Guojun
2020-04-01Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin transactionsMoses, Noel Dogonyaro; Victor, Waziri Onomza; Abdulhamid, Shafi’i Muhammad; Joseph, Ojeniyi Adebayo; Okoro, Malvis Ugonna
2019-08-13Performance Analysis of Security Information and Event Management Solutions Detecting Web-Based AttacksMorufu, Olalere; Juliana, Ndunagu; Abdulhamid, Shafi’i Muhammad; Odey, Peter
2017Developing a Secure Distributed Electronic Health System Using Information Hiding TechniquesAbdulsalam, Yunusa Simpa; Olaniyi, Olayemi Mikail; Ahmed, Aliyu; Olaniyan, O. M.
2023-03-22Cloud Data Security Audit Report Techniques Using Bat Inspired Algorithm (CDSART-BA): A ReviewAbdulkarim, Onuja M.; Adebayo, Olawale Surajudeen; Aliyu, Hamzat Olanrewaju; Olalere, Morufu
2019V-Authenticate: Voice Authentication System for Electorates Living with DisabilityOlaniyi, Olayemi Mikail; Bala, Jibril Abdullahi; Ndunagu, Juliana; Abubakar, Adamu; Ishaq, Ahmad
2024-04A User Oriented, Flexible Real-Time Motion Triggered Surveillance System for Highly Restricted AreasDauda, Aji Idris; Abdullahi, Ibrahim Mohammed; Nuhu, Bello Kontagora; Ahmed, Aliyu; Jeremiah, I