Search
Now showing items 1-7 of 7
Computational resource optimization in Ugandan Tertiary Institutions
(Fountain Publishers, 2007)
Insufficient computational power, caused by limited budgets is a big challenge to high quality research and education in developing countries. Some institutions suffer acute shortages while others enjoy comparatively more ...
Model-based testing of network security protocols in Java card applications
(2006-10)
This research presents a combination of verification and conformance testing techniques for systems that implement network security protocols. We investigate model-based methods for detecting vulnerabilities in network ...
Security analysis of an agent-mediated book trading application
(Fountain Publishers Kampala, 2009)
This paper presents a security analysis of an agent mediated application in an open distributed
environment. We use a case study of a book trading application that we implemented using
Agent scape and JADE agent ...
Security analysis of an agent-mediated booktrading application
(International Journal of Computing and ICT Research (IJCIR), 2009-10)
This paper presents a security analysis of an agent mediated application in an open distributed environment. We use a case study of a booktrading application that we implemented using AgentScape and JADE agent platforms. ...
Security analysis of remote e-voting
(International Conference on Computing and ICT Research / Fountain Publishers, 2007-08-08)
In this paper, we analyze security considerations for a remote Internet voting system based on the system architecture of remote Internet voting. We examine whether it is feasible to successfully carry out remote electronic ...
Security analysis of remote e-voting
(Fountain Publishers Kampala, 2007)
In this paper, we analyze security considerations for a remote Internet voting system
based on the system architecture of remote Internet voting. We examine whether it
is feasible to successfully carry out remote ...
Computational resource optimization in Ugandan tertiary institutions
(Fountain Publishers Kampala, 2007)
Insufficient computational power, caused by limited budgets is a big challenge to high
quality research and education in developing countries. Some institutions suffer severe
shortages while others enjoy comparatively ...