Aderonke F. Thompson

Affiliations:
  • Federal University of Technology Akure, Nigeria


According to our database1, Aderonke F. Thompson authored at least 14 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Post-quantum cryptography-driven security framework for cloud computing.
Open Comput. Sci., 2022

2021
Optimised Privacy Model for Cloud Data.
Proceedings of the 16th International Conference on Computer Science & Education, 2021

2020
A Secured System for Internet Enabled Host Devices.
Netw. Commun. Technol., 2020

Modelling Malicious Attack in Social Networks.
Netw. Commun. Technol., 2020

2017
Epidemic Response Model for Malware Defense on Computer Networks.
Int. J. Cyber Situational Aware., 2017

A location privacy system in mobile network using game theory.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

A graphic-based cryptographic model for authentication.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

2015
A Fine-Grained Data Access Control System in Wireless Sensor Network.
Acta Informatica Pragensia, 2015

Risk analysis in cyber situation awareness using Bayesian approach.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

Development of cyber situation awareness model.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

2014
An Attribute-Based Signature using rivest shamir adleman scheme.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

A replication model for students' result processing.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

A robust multicast authentication scheme based on asymmetric key signature.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Evaluation of information security risks using hybrid assessment model.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014


  Loading...