Implementation of N-Cryptographic Multilevel Cryptography Using RSA and Substitution Cryptosystem OS Adebayo, M Olalere, J Ugwu MIS Review, 2015 | 2 | 2015 |
Comparative analysis of Different Multilevel States for Four Notable Cryptographic Schemes JN Ugwu, SA Mogaji, SE Akinsanya, JO Awoyemi, JC Obi Researchers Journal of Science and Technology 4 (2), 60-77, 2024 | 1 | 2024 |
Performance Evaluation of Hybrid and Standalone Techniques on Web Applications Based Cross-Site Scripting Attacks BA Ayogu, GO Ogunleye, TF Benjamin, JN Ugwu LAUTECH Journal of Engineering and Technology 17 (2), 111-120, 2023 | 1 | 2023 |
Organizational Attendance Record System: Fraud and A Proposed Facial Recognition Technique M Olalere, JA Ojeniyi, F Osho, JN Ugwu | 1 | 2015 |
N-Cryptographic Multilevel Algorithm for Effective Information Security OS Adebayo, M Olalere, A Mishra, MA Mabayoje, JN Ugwu | 1 | 2014 |
Comparative Analysis of Eight Different Blockchain Technology Schemes and Their Implementations JN Ugwu, JB Hassan, SE Akinsanya, BA Ayogu University of Ibadan Journal of Science and Logics in ICT Research 11 (1), 74-87, 2024 | | 2024 |
Steganalysis of an Image-Based Semantic Segmented and Binary Pattern Complex Stego File Using RNN And DenseNet JN Ugwu, TT Odufuwa, SE Akinsanya, KV Fajembola FUOYE Journal of Pure and Applied Sciences (FJPAS) 9 (1), 162-177, 2024 | | 2024 |
N-Cryptographic Multilevel Algorithm for Effective Information Security SA Olawale, M Olalere, A Mishra, MA Mabayoje, JN Ugwu Society for Science and Education, United Kingdom., 2014 | | 2014 |
Cyber Security Education: A Tool for National Security M Olalere, DVO Waziri, I Ismaila, OS Adebayo, JN Ugwu | | 2014 |