Bruce Ndibanje

Orcid: 0000-0003-3894-9775

According to our database1, Bruce Ndibanje authored at least 19 papers between 2011 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks.
Sensors, 2019

Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach.
Sensors, 2019

2015
A Privacy Preserving Security Protocol-Based Application for Wireless Communication System.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An Effective and Secure User Authentication and Key Agreement Scheme in m-Healthcare Systems.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An Approach to Designing a Network Security-based Application for Communications Safety.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Hybrid Cloud Service Based Healthcare Solutions.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Smartphone-Based Secure Access Control in Wireless Network Analysis.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Correlation Power Analysis Attack on the Ping Pong-128 Key Stream Generator.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

An Efficient and Provable Secret Shared Key Computation for Cryptographic Protocol Across Insecure Channel.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things.
Sensors, 2014

Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher.
J. Inform. and Commun. Convergence Engineering, 2014

Anonymization algorithm for security and confidentiality of health data set across social network.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

Cryptographic computation of private shared key based mutual authentication protocol: Simulation and modeling over wireless networks.
Proceedings of the International Conference on Information Networking 2014, 2014

An enhanced passivation layer for secure consumer integrated circuit devices.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

2013
Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

A hybrid and fast authentication protocol for handoff support in e-healthcare systems among WSNs.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

2012
Data Link Layer' Security Analysis for Wireless Sensor Networks.
Proceedings of the Computer Applications for Communication, Networking, and Digital Contents, 2012

2011
An Efficient Hardware Countermeasure against Differential Power Analysis Attack.
Proceedings of the Convergence and Hybrid Information Technology, 2011


  Loading...