• Login
  • Help Guide
Browsing School of Informatics & Innovative Systems by Subject 
  •   JOOUST IR Home
  • Journal Articles
  • School of Informatics & Innovative Systems
  • Browsing School of Informatics & Innovative Systems by Subject
  •   JOOUST IR Home
  • Journal Articles
  • School of Informatics & Innovative Systems
  • Browsing School of Informatics & Innovative Systems by Subject
JavaScript is disabled for your browser. Some features of this site may not work without it.

Browsing School of Informatics & Innovative Systems by Subject "Authentication"

  • 0-9
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z

Sort by:

Order:

Results:

Now showing items 1-4 of 4

  • title
  • issue date
  • submit date
  • Type
  • ascending
  • descending
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
    • Thumbnail

      Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities 

      Nyangaresi, Vincent Omollo (Wiley Online Library, 2024-12-20)
      Smart cities amalgamate technologies such as Internet of Things, big data analytics, and cloud computing to collect and analyze large volumes of data from varied sources which facilitate intelligent surveillance, enhanced ...
    • Thumbnail

      Efficient Group Authentication Protocol for Secure 5G Enabled Vehicular Communications 

      Omollo, Vincent Nyangaresi; Joachim, Anthony Rodrigues; Onyango, Silvance Abeka (IEEE, 2020-12-30)
      The fifth generation (5G) networks exhibit extremely low latency, extremely high bandwidth, and high density connections that are salient features for the support of vehicle to everything (V2X) services. Although a lot of ...
    • Thumbnail

      Machine Learning Protocol for Secure 5G Handovers 

      Nyangaresi, Vincent Omollo; Rodrigues, Anthony Joachim; Abeka, Silvance Onyango (JOOUST, 2022-01-27)
      The fifth generation (5G) networks are characterized with ultra-dense deployment of base stations with limited footprint. Consequently, user equipment’s handover frequently as they move within 5G networks. In addition, 5G ...
    • Thumbnail

      Secure Timing Advance Based Context-Aware Handover Protocol for Vehicular Ad-Hoc Heterogeneous Networks 

      Nyangaresi, Vincent Omollo; Abeka, Silvance O.; Rodgrigues, Anthony J. (International Journal of Cyber-Security and Digital Forensics, 2018)
      Heterogeneous networks and their applications introduce new shortcomings in terms of access control and confidentiality during handover process. Unfortunately, implementing stronger security mechanisms during the handover ...

      Browse

      All of JOOUST IRCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

      My Account

      LoginRegister

      Contact Us

      Copyright © 2023-4 Jaramogi Oginga Odinga University of Science and Technology (JOOUST)
      P.O. Box 210 - 40601
      Bondo – Kenya

      Useful Links

      • Report a problem with the content
      • Accessibility Policy
      • Deaccession/Takedown Policy

      TwitterFacebookYouTubeInstagram

      • University Policies
      • Access to Information
      • JOOUST Quality Statement