Computer Sciences and Telecommunications 2018 | No.2(54) [2018.06.30]
Nureni Ayofe AZEEZ
ACHIEVING DATA AUTHENTICATION WITH HMAC-SHA256 ALGORITHM
34-43
View article (PDF)
or
Abstract
Nureni Ayofe AZEEZ
RDBMS QUERY FOR AUTHENTICATING ACCESS TO PATIENT INFORMATION
44-56
View article (PDF)
or
Abstract
Computer Sciences and Telecommunications 2013 | No.3(39) [2013.11.30]
Nureni Ayofe AZEEZ
STATISTICAL INTERPRETATIONS OF THE TURNAROUND TIME VALUES FOR A SCALABLE 3-TIER GRID-BASED COMPUTING ARCHITECTURE
67-75
View article (PDF)
or
Abstract
Computer Sciences and Telecommunications 2011 | No.3(32) [2011.11.15]
Nureni Ayofe AZEEZ
,
Isabella Venter
,
Tiko Iyamu
GRID COMPUTING WITH ALCHEMI: AN APPRAISAL AND RESEARCH CHALLENGES
39-43
View article (PDF)
or
Abstract
Computer Sciences and Telecommunications 2010 | No.6(29) [2010.12.31]
Nureni Ayofe AZEEZ
CYBER SECURITY: CHALLENGES AND THE WAY FORWARD
56-69
View article (PDF)
or
Abstract
1
Internet Academy
2001-2024