关注
Martha N. Kamkuemah
Martha N. Kamkuemah
Postdoctoral Fellow at Stellenbosch University
在 aims.ac.za 的电子邮件经过验证
标题
引用次数
引用次数
年份
A study of different routing protocols for mobile phone ad hoc networks connected via Bluetooth
M Kamkuemah, H Le
2013 UKSim 15th International Conference on Computer Modelling and …, 2013
102013
Epistemic analysis of a key-management vulnerability in LoRaWAN
MN Kamkuemah
2021 18th International Conference on Privacy, Security and Trust (PST), 1-7, 2021
22021
Routing in Mobile Phone Ad Hoc Networks
M Kamkuemah, H Le
2013 Fifth International Conference on Computational Intelligence …, 2013
22013
An analysis of security protocols for lightweight systems
MN Kamkuemah
Stellenbosch: Stellenbosch University, 2022
12022
Reasoning about Authentication and Secrecy in the Signal Protocol
MN Kamkuemah
2021 International Conference on Electrical, Computer and Energy …, 2021
12021
NFT formalised
MN Kamkuemah, JW Sanders
https://arxiv.org/abs/2310.14600, 12, 2023
2023
Authentication and Privacy by Zero-Knowledge Protocols
44th Annual Conference, South African Institute of Computer Scientists and …, 2023
2023
Routing in Mobile Ad hoc Networks using Bluetooth and Mobile Phones.
M Kamkuemah, H Le
International Journal of Simulation--Systems, Science & Technology 14 (4), 2013
2013
A study of mobile phone ad hoc networks via bluetooth with different routing protocols
MN Kamkuemah
2013
Integrated Query of the Hidden Web
S Berman, M Kamkuemah, J Muntunemuine
University of Cape Town, 2009
2009
Querying the Deep Web
M Kamkuemah, J Muntunemuine, S Berman
系统目前无法执行此操作,请稍后再试。
文章 1–11