Implementation of N-Cryptographic Multilevel Cryptography Using RSA and Substitution Cryptosystem OS Adebayo, M Olalere, J Ugwu MIS Review, 2015 | 2 | 2015 |
PERFORMANCE EVALUATION OF HYBRID AND STANDALONE TECHNIQUES ON WEB APPLICATIONS BASED CROSS-SITE SCRIPTING ATTACKS BA Ayogu, GO Ogunleye, TF Benjamin, JN Ugwu LAUTECH Journal of Engineering and Technology 17 (2), 111-120, 2023 | 1 | 2023 |
Organizational Attendance Record System: Fraud and A Proposed Facial Recognition Technique M Olalere, JA Ojeniyi, F Osho, JN Ugwu | 1 | 2015 |
N-Cryptographic Multilevel Algorithm for Effective Information Security OS Adebayo, M Olalere, A Mishra, MA Mabayoje, JN Ugwu | 1 | 2014 |
Comparative Analysis of Different Multilevel States for Four Notable Cryptographic Schemes JN Ugwu, SA Mogaji, SE Akinsanya, JO Awoyemi, JC Obi Researchers Journal of Science and Technology 4 (2), 60-77, 2024 | | 2024 |
Comparative Analysis of Eight Different Blockchain Technology Schemes and Their Implementations JN Ugwu, JB Hassan, SE Akinsanya, BA Ayogu, SS Adubi, M Olagunju | | 2024 |
N-Cryptographic Multilevel Algorithm for Effective Information Security SA Olawale, M Olalere, A Mishra, MA Mabayoje, JN Ugwu Society for Science and Education, United Kingdom., 2014 | | 2014 |
Cyber Security Education: A Tool for National Security M Olalere, DVO Waziri, I Ismaila, OS Adebayo, JN Ugwu | | 2014 |