Search Results - "Domenic, Kamenyi"

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network by Omala, Anyembe Andrew, Mbandu, Angolo Shem, Mutiria, Kamenyi Domenic, Jin, Chunhua, Li, Fagen

    Published in Journal of medical systems (01-06-2018)
    “…Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in…”
    Get full text
    Journal Article
  2. 2

    Preserving users' privacy for continuous query services in road networks by Domenic, M. Kamenyi, Yong Wang, Fengli Zhang, Memon, Imran, Gustav, Yankson H.

    “…Mobile devices (e.g., smart phones) and location based services are very popular with today's users. Due to this popularity, there has been a tremendous…”
    Get full text
    Conference Proceeding
  3. 3

    Rumor Riding: An Anonymity Approach for Decentralized Peer to Peer Systems by Memon, Imran, Domenic, Kamenyi, Memon, Hina, Akhtar, Rizwan, Yong, Wang, Zhang, Fengli

    Published in Wireless personal communications (01-11-2014)
    “…The anonymizing peer to peer (P2P) system is frequently incurred additional expense in order to efficiency transfer and various systems execute to disguise the…”
    Get full text
    Journal Article
  4. 4

    Modeling the spreading behavior of passive worms in mobile social networks by Adu-Gyamfi, D., Yong Wang, Fengli Zhang, Domenic, M. Kamenyi, Memon, Imran, Gustav, Yankson H.

    “…Spreading behavior of passive worms, in mobile social networks has raised a lot of concerns for malicious worms researchers in network security for some time…”
    Get full text
    Conference Proceeding
  5. 5

    Optimized MHealth Batch Verification for a Variant of DSA by Mbandu, Angolo Shem, Chunxiang Xu, Mutiria, Kamenyi Domenic

    “…With more and more research focusing on Health Care services, there is need for efficient authentication by use of digital signatures. Currently, the DSA is…”
    Get full text
    Conference Proceeding
  6. 6

    VANET Cluster-on-Demand Minimum Spanning Tree (MST) Prim clustering algorithm by Kponyo, Jerry John, Yujun Kuang, Enzhan Zhang, Domenic, Kamenyi

    “…Vehicle to Vehicle (V2V) communication offers great potential as far as information dissemination in VANETs is concerned. Research has shown that clustering…”
    Get full text
    Conference Proceeding
  7. 7

    Velocity similarity anonymization for continuous query Location based services by Gustav, Yankson H., Yong Wang, Domenic, M. Kamenyi, Fengli Zhang, Memon, Imran

    “…In this paper, we introduced a novel query privacy algorithm called the direction speed dynamic cloaking algorithm (DSDCA) for continuous query Location based…”
    Get full text
    Conference Proceeding