Now showing items 1-3 of 3

    • Implementing security in wireless sensor networks 

      Kizza, Joseph Migga (Fountain Publishers, Kampala., 2008)
      Wireless sensor networks (WSN) consist of a large number of small sensor nodes, usually spread out in hard accessible areas and communicating wirelessly. A sensor node Combines the abilities to sense, compute, and communicate ...
    • Model-based testing of network security protocols in Java card applications 

      Ssekibuule, Richard (2006-10)
      This research presents a combination of verification and conformance testing techniques for systems that implement network security protocols. We investigate model-based methods for detecting vulnerabilities in network ...
    • On enhancing network security with role-based access control 

      Mubiru, Hassan (2007-09)
      People in an enterprise should not be allowed to simply sit down and start working with a computer; only authorized personnel should be allowed to use the computer and its applications. Furthermore, authorised users should ...