Now showing items 1-8 of 8

    • Computational resource optimization in Ugandan Tertiary Institutions 

      Ssekibuule, Richard; Lakuma, Joel; Ngubiri, John (Fountain Publishers, 2007)
      Insufficient computational power, caused by limited budgets is a big challenge to high quality research and education in developing countries. Some institutions suffer acute shortages while others enjoy comparatively more ...
    • Computational resource optimization in Ugandan tertiary institutions 

      Ssekibuule, Richard; Lakuma, Joel; Ngubiri, John (Fountain Publishers Kampala, 2007)
      Insufficient computational power, caused by limited budgets is a big challenge to high quality research and education in developing countries. Some institutions suffer severe shortages while others enjoy comparatively ...
    • Model-based testing of network security protocols in Java card applications 

      Ssekibuule, Richard (2006-10)
      This research presents a combination of verification and conformance testing techniques for systems that implement network security protocols. We investigate model-based methods for detecting vulnerabilities in network ...
    • Security analysis of an agent-mediated book trading application 

      Ssekibuule, Richard; Quenum, Jose Ghislain (Fountain Publishers Kampala, 2009)
      This paper presents a security analysis of an agent mediated application in an open distributed environment. We use a case study of a book trading application that we implemented using Agent scape and JADE agent ...
    • Security analysis of an agent-mediated booktrading application 

      Ssekibuule, Richard; Quenum, Ghislain Jose (International Journal of Computing and ICT Research (IJCIR), 2009-10)
      This paper presents a security analysis of an agent mediated application in an open distributed environment. We use a case study of a booktrading application that we implemented using AgentScape and JADE agent platforms. ...
    • Security analysis of remote e-voting 

      Ssekibuule, Richard; Mirembe, Drake Patrick (International Conference on Computing and ICT Research / Fountain Publishers, 2007-08-08)
      In this paper, we analyze security considerations for a remote Internet voting system based on the system architecture of remote Internet voting. We examine whether it is feasible to successfully carry out remote electronic ...
    • Security analysis of remote e-voting 

      Ssekibuule, Richard (Fountain Publishers Kampala, 2007)
      In this paper, we analyze security considerations for a remote Internet voting system based on the system architecture of remote Internet voting. We examine whether it is feasible to successfully carry out remote ...
    • Security in agent-mediated negotiation frameworks 

      Ssekibuule, Richard (Austrian Society for Cybernetic Studies, 2010-04-06)
      Several researchers in agent systems have proposed various settings for agent-mediated applications. As is the case with most software systems, there are security implications for any design decisions. This paper analyzes ...