Provably secure heterogeneous access control scheme for wireless body area network AA Omala, AS Mbandu, KD Mutiria, C Jin, F Li Journal of Medical Systems 42, 1-14, 2018 | 51 | 2018 |
Cryptanalysis of a pairing-free certificateless signcryption scheme P Kasyoka, M Kimwele, SM Angolo Ict Express 7 (2), 200-204, 2021 | 16 | 2021 |
Towards an efficient certificateless access control scheme for wireless body area networks P Kasyoka, M Kimwele, SM Angolo Wireless Personal Communications 115 (2), 1257-1275, 2020 | 13 | 2020 |
Multi‐user broadcast authentication scheme for wireless sensor network based on elliptic curve cryptography P Kasyoka, M Kimwele, SM Angolo Engineering Reports 2 (7), e12176, 2020 | 10 | 2020 |
Applying variant variable regularized logistic regression for modeling software defect predictor GK Armah, G Luo, K Qin, AS Mbandu Lecture Notes on Software Engineering 4 (2), 107-115, 2016 | 8 | 2016 |
Secure opportunistic computing privacy preserving group signature authentication scheme for M-Healthcare emergency AS Mbandu, X Chunxiang, KD Mutiria International Journal of Information and Electronics Engineering 5 (5), 335, 2015 | 2 | 2015 |
Positioning Co-operatives as Partners in Global Health Agenda: How to go about it in Africa P Anania, SM Angolo, AS Sife The Co-operative University of Kenya, 2020 | 1 | 2020 |
Factors that influence the choice of virtualized environments in small medium enterprises V Motochi, SM Mbuguah, SA Mbandu International Journal of Advanced Research in Computer Engineering & Technology, 2017 | 1 | 2017 |
Applying Variant Variable Regularized Logistic Regression for Modeling Software Defect Predictor SM Angolo, GK Armah, G Luo, K Qin | 1 | 2016 |
Recommender Privacy Preserving Reputation Based Medical Services Scheme Using a Variant of ElGamal AS Mbandu, C Xu, KD Mutiria, GK Armah International Journal of Computer and Communication Engineering 4 (4), 234, 2015 | 1 | 2015 |
A Survey of Artificial Intelligence in Cyber Security D Nyale, SM Angolo International Journal of Computer Applications Technology and Research, 2022 | | 2022 |
Correction to: Efficient Certificateless Signcryption Scheme for Wireless Sensor Networks in Ubiquitous Healthcare Systems. PN Kasyoka, MW Kimwele, AS Mbandu Wirel. Pers. Commun. 118 (4), 3367, 2021 | | 2021 |
Understanding Wi-Fi, and its long-term effect on human health SM Angolo | | 2019 |
Privacy preserving reputation based medical services scheme using a variant of Elgamal SM Angolo, KA Gabriel, CX Xu, DM Kamenyi Applied Mechanics and Materials 704, 464-473, 2015 | | 2015 |
Secure Opportunistic Computing Privacy Preserving Group Signature Authentication Scheme for M-Healthcare Emergency SM Angolo, C Xu, DM Kamenyi | | 2015 |
Optimized MHealth Batch Verification For a Variant of DSA SM Angolo, C Xu, DM Kamenyi IEEE computer society, 2014 | | 2014 |
E-government in Kenya: a conceptual framework to increase public participation SM Angolo | | 2009 |
Unravelling DevOps Agile Methodologies: A Comprehensive Review of Recent Research D Nyale, SM Angolo | | |