Search
Now showing items 21-30 of 30
Determinants of adoption of internet banking by trade finance customers in East Africa
(HR mars, 2012)
It is increasingly more interesting to the bank managers to understand what is important to customers when it comes to Internet banking, and especially banking conducted by the customers themselves. The purpose of this ...
Security evaluation of cellular networks handover techniques
(MECS (http://www.mecs-press.org/), 2018-05)
This paper examined the handovers in cellular networks from both functional and informational security point of view. The aim was to find out if the security goals of confidentiality, integrity and availability (CIA) are ...
Multivariate probabilistic synthesis of cellular networks teletraffic blocking with poissonian distribution arrival rates
(MECS(http://www.mecs-press.net), 2018-07-08)
Cellular networks are characterized by mobility in which subscribers move freely within the coverage area. Since the radio spectrum is a scarce resource, the available bandwidth is divided by using a combination of Time- ...
Effectiveness of security controls on electronic health records
(IJSTR, 2017-12)
Electronic Health Record (EHR) systems enhance efficiency and effectiveness in handling patients ‘information in healthcare. This study focused on the EHR security by initially establishing the nature of threats affecting ...
Secure Handover Protocol for High Speed 5GNetworks
(Int.J. AdvancedNetworkingandApplications, 2020-07-07)
The motivations behind 5G networks include seamless handovers, higher data rates, lower latencies of about one milli second, and enhanced coverage compared to 4G networks. To achieve these goals, network densification has ...
Secure Timing Advance Based Context-Aware Handover Protocol for Vehicular Ad-Hoc Heterogeneous Networks
(International Journal of Cyber-Security and Digital Forensics, 2018)
Heterogeneous networks and their applications introduce new shortcomings in terms of access control and confidentiality during handover process. Unfortunately, implementing stronger security mechanisms during the handover ...
GUTI-Based Multi-Factor Authentication Protocol for De-synchronization Attack Prevention in LTE Handovers
(International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2020)
The motivations behind the long term evolution(LTE)networks are low latency, high bandwidths and high data rates. The low latency requirement is tricky and cumbersome to achieve during handovers given that the communication ...
Assessment Of Ict Disaster Recovery And Preparedness Among Health Research Institutions In Kisumu County, Kenya
(International Journal of Scientific & Engineering Research (IJSER), 2020-05)
Research organizations utilize information technology to generate process and transmit both sensitive and vital data that is critical in development of drugs, vaccines and health policy. Despite the role ICT plays in this ...
Assessing the Current Status of Information Security Policies Among Saccos in Kenya
(IISTE, 2019-09-30)
In 2013, Communication Authority of Kenya (CAK) recorded cyber-attacks amounting to Sh5.4 million loses. In April 2016, Bandari Savings and Credit Cooperative Society lost Sh5 million through fraudulent ATM withdrawals ...
Improving Learner Engagements through Implementing Technology-Enabled Learning
(Commonwealth Of Learning, 2020)
Introduction
The emergence of information and communication technologies (ICT) has changed the nature of the learning environments experienced by students. Educators have always created, selected and provided environments ...