Search
Now showing items 61-70 of 70
International Journal of Academic Studies on Theory and Applications of Mathematics to Security in Cloud Computing: A Case of Addition-Composition Fully Homomorphic Encryption Scheme
(ResearchGate, 2016-04-12)
Addition-Composition Fully Homomorphic Encryption is given in this paper to solve data security equation in cloud computation. An earlier attempt to solve security problem has been proposed by Craig Gentry, who combined ...
Validation of Extended Theory of Reasoned Action to Predict Mobile Phone Money Usage
(World Journal of Computer Application and Technology, 2018-01-13)
Theory of Reasoned Action (TRA), postulated by social psychologist, has been established to be relevant in guiding Information Systems studies. The theory resulted from attitude research using the Expectancy Value Models. ...
Emerging Security Challenges due to Bring Your Own Device Adoption
(International Journal of Science and Research (IJSR), 2018-01-01)
Although a number of researches have been carried out by various organizations across the globe to establish security challenges facing education institutions due to BYOD adoption there is no evidence that a similar study ...
Assessment of Security Measures in Universities for Enforcement of Integrity of Information Systems in Kisumu and Siaya Counties, Kenya
(IJRDO - Journal of Computer Science and Engineering, 2015-06)
An ICT policy safeguards Integrity of Information Systems and ensures business continuity. This study sought to assess the level of compliance by Universities to their ICT security policies by assessing the integrity pillar. ...
Confidentiality and Availability of Security Measures for Information Systems in Universities in Kisumu and Siaya Counties, Kenya
(IJRDO-Journal Of Mathematics, 2016-08)
Many organizations continue to grow in numbers by the day in adopting use and adoption of ICT in day to day business processes and so are the rising trends in cyber insecurity. Securing information systems against myriad ...
Effects of Information System Controls on Enhancing Security of Information Systems within Universities
(IOSR Journal of Engineering (IOSRJEN), 2017-11-11)
Universities in the world today consider information to be their most important asset. They therefore ensure information security by taking appropriate measures to ensure no information is leaked or passed to unauthorized ...
A Review of Factors Influencing e-Health Adoption in Kenya: Barriers And Facilitators
(2014)
Over the past few decades, there has been a great leap in the development
of Information and Communication Technology (ICT); both in hardware and
software capabilities. This has provided a sound platform for their ...
Socio-demographic Determinants of Soil Erosion Levels among the Farming Households in Nyakach Sub-county, Kenya
(Journal of Humanities and Social Science, 2019)
Soil degradation is a world-wide problem facing humanity today. In Nyakach Sub-county the
problem has persisted over the years. This study set out to assess the influence of socio-demographic
characteristics of farmers ...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully Homomorphic Encryption Scheme
(ResearchGate, 2017)
This paper focusses on the use of homomorphic encryption schemes in solving data security in cloud computation. We started by acknowledging Gentry’s contribution on partial homomorphic encryption schemes where he constructed ...
The Role of ICT in Appreciating Tri-Axis Efforts of Research, Publications and Library Services in Higher Education
(2013)
Information and Communication Technology (ICT) is a principal enabler
to nearly all functional efforts including quality assurance sustenance in higher
education. Studies have revealed that research has a feeder effect ...