Kester Quist-Aphetsi

Orcid: 0000-0002-5378-6268

According to our database1, Kester Quist-Aphetsi authored at least 24 papers between 2013 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Towards a Secure Communication of Data in IoT Networks: A Technical Research Report.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

2016
Using Formal Concepts Analysis Techniques in Mining Data from Criminal Databases and Profiling Events Based on Factors to Understand Criminal Environments.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

A Hybrid Lossy Compression Using 2-D Discrete Cosine Transform and Visual Cryptographic Technique for Security of Multimedia Image Data Communications in Internet of Things.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2016

Spatial Cryptographic and Watermarking Technique for Authentication and Security of Medical Images in a Cloud Based Health Information Systems.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2016

An Integrated RoIP Communication Network for Effective Collaboration During Emergency and Disaster Management.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2016

2015
A Novel Hybrid Discrete Cosine Transformation and Visual Cryptographic Technique for Securing Digital Images.
Proceedings of the UKSim-AMSS 17th International Conference on Computer Modelling and Simulation, 2015

A Hybrid Image Cryptographic and Spatial Digital Watermarking Encryption Technique for Security and Authentication of Digital Images.
Proceedings of the UKSim-AMSS 17th International Conference on Computer Modelling and Simulation, 2015

A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images.
Proceedings of the Security in Computing and Communications, 2015

A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images.
Proceedings of the Security in Computing and Communications, 2015

Feature Based Encryption Technique for Securing Digital Image Data Based on FCA-Image Attributes and Visual Cryptography.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

A Security Technique for Authentication and Security of Medical Images in Health Information Systems.
Proceedings of the 15th International Conference on Computational Science and Its Applications, 2015

2014
A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel Displacement.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

2013
An Integrated Geographic Information System and Marketing Information System Model.
CoRR, 2013

Using SOA with Web Services for effective data integration of Enterprise Pharmaceutical Information Systems.
CoRR, 2013

Criminal Geographical Profiling: Using FCA for Visualization and Analysis of Crime Data.
CoRR, 2013

Visualization and Analysis of Geographical Crime Patterns Using Formal Concept Analysis.
CoRR, 2013

A Visual Cryptographic Encryption Technique for Securing Medical Images.
CoRR, 2013

Using SOA with Web Services for effective Integration of Hospital Information Systems via an Enterprise Service Bus.
CoRR, 2013

The Role of Rural Banks in Providing Mobile Money Services to Rural Poor Communities: An effective integration approach of Rural Banks and existing mobile communications infrastructure.
CoRR, 2013

Computer Aided Investigation: Visualization and Analysis of data from Mobile communication devices using Formal Concept Analysis.
CoRR, 2013

A Hybrid Cryptosystem Based On Vigenere Cipher and Columnar Transposition Cipher.
CoRR, 2013

A cryptographic image encryption technique for facial-blurring of images.
CoRR, 2013

A New Encryption Cipher for Securing Digital Images of Video Surveillance Devices Using Diffie-Hellman-MD5 Algorithm and RGB Pixel Shuffling.
Proceedings of the Seventh UKSim/AMSS European Modelling Symposium, 2013

A Novel Cryptographic Encryption Technique for Securing Digital Images in the Cloud Using AES and RGB Pixel Displacement.
Proceedings of the Seventh UKSim/AMSS European Modelling Symposium, 2013


  Loading...