A study of different routing protocols for mobile phone ad hoc networks connected via Bluetooth M Kamkuemah, H Le 2013 UKSim 15th International Conference on Computer Modelling and …, 2013 | 10 | 2013 |
Epistemic analysis of a key-management vulnerability in LoRaWAN MN Kamkuemah 2021 18th International Conference on Privacy, Security and Trust (PST), 1-7, 2021 | 2 | 2021 |
Routing in Mobile Phone Ad Hoc Networks M Kamkuemah, H Le 2013 Fifth International Conference on Computational Intelligence …, 2013 | 2 | 2013 |
An analysis of security protocols for lightweight systems MN Kamkuemah Stellenbosch: Stellenbosch University, 2022 | 1 | 2022 |
Reasoning about Authentication and Secrecy in the Signal Protocol MN Kamkuemah 2021 International Conference on Electrical, Computer and Energy …, 2021 | 1 | 2021 |
NFT formalised MN Kamkuemah, JW Sanders https://arxiv.org/abs/2310.14600, 12, 2023 | | 2023 |
Authentication and Privacy by Zero-Knowledge Protocols 44th Annual Conference, South African Institute of Computer Scientists and …, 2023 | | 2023 |
Routing in Mobile Ad hoc Networks using Bluetooth and Mobile Phones. M Kamkuemah, H Le International Journal of Simulation--Systems, Science & Technology 14 (4), 2013 | | 2013 |
A study of mobile phone ad hoc networks via bluetooth with different routing protocols MN Kamkuemah | | 2013 |
Integrated Query of the Hidden Web S Berman, M Kamkuemah, J Muntunemuine University of Cape Town, 2009 | | 2009 |
Querying the Deep Web M Kamkuemah, J Muntunemuine, S Berman | | |