default search action
Aderonke F. Thompson
Person information
- affiliation: Federal University of Technology Akure, Nigeria
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j5]Henry Chima Ukwuoma, Arome Junior Gabriel, Aderonke F. Thompson, Boniface Kayode Alese:
Post-quantum cryptography-driven security framework for cloud computing. Open Comput. Sci. 12(1): 142-153 (2022) - 2021
- [c9]Henry Chima Ukwuoma, Arome Junior Gabriel, Aderonke F. Thompson, Boniface Kayode Alese:
Optimised Privacy Model for Cloud Data. ICCSE 2021: 267-269 - 2020
- [j4]Aderonke F. Thompson, Oghenerukevwe E. Oyinloye, Matthew T. David, Boniface K. Alese:
A Secured System for Internet Enabled Host Devices. Netw. Commun. Technol. 5(1): 26-36 (2020) - [j3]O. Amusan, Aderonke F. Thompson, Timilehin B. Aderinola, Boniface K. Alese:
Modelling Malicious Attack in Social Networks. Netw. Commun. Technol. 5(1): 37-43 (2020)
2010 – 2019
- 2017
- [j2]Timilehin B. Aderinola, Aderonke F. Thompson, Boniface K. Alese:
Epidemic Response Model for Malware Defense on Computer Networks. Int. J. Cyber Situational Aware. 2(1): 69-84 (2017) - [c8]Boniface Kayode Alese, Abimbola Akindele, Folasade Mojisola Dahunsi, Aderonke F. Thompson, Tosin Adesuyi:
A graphic-based cryptographic model for authentication. CyberSA 2017: 1-10 - [c7]Boniface Kayode Alese, Aderonke F. Thompson, Patricia Yetunde Oni:
A location privacy system in mobile network using game theory. CyberSA 2017: 1-5 - 2015
- [j1]Boniface K. Alese, Sylvester O. Olatunji, Oluwatoyin C. Agbonifo, Aderonke F. Thompson:
A Fine-Grained Data Access Control System in Wireless Sensor Network. Acta Informatica Pragensia 4(3): 276-287 (2015) - [c6]Dauda Adenusi, Boniface Kayode Alese, Bamidele Moses Kuboye, Aderonke Favour-Bethy Thompson:
Development of cyber situation awareness model. CyberSA 2015: 1-11 - [c5]Moyinoluwa Abidemi Bode, Samuel Adebayo Oluwadare, Boniface Kayode Alese, Aderonke Favour-Bethy Thompson:
Risk analysis in cyber situation awareness using Bayesian approach. CyberSA 2015: 1-12 - 2014
- [c4]Otasowie Iyare, Aderonke Favour-Bethy Thompson, Boniface Kayode Alese:
A replication model for students' result processing. ICITST 2014: 295-301 - [c3]L. A. Nwosu, Aderonke Favour-Bethy Thompson, Boniface Kayode Alese, Olumide Olayinka Obe:
An Attribute-Based Signature using rivest shamir adleman scheme. ICITST 2014: 380-386 - [c2]Boniface Kayode Alese, O. Oyebade, A. Osuolale Festus, Otasowie Iyare, Aderonke Favour-Bethy Thompson:
Evaluation of information security risks using hybrid assessment model. ICITST 2014: 387-395 - [c1]Abikoye Oluwakemi Christianah, Boniface Kayode Alese, Aderonke Favour-Bethy Thompson, D. Alowolodu Olufunso, A. Osuolale Festus:
A robust multicast authentication scheme based on asymmetric key signature. ICITST 2014: 449-458
Coauthor Index
aka: Boniface Kayode Alese
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint