Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Charles A. Shoniregun
2010 – today
- 2012
[e1]Nick Savage, Safwan El Assad, Charles A. Shoniregun (Eds.): 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, December 10-12, 2012. IEEE 2012, ISBN 978-1-4673-5325-0- 2011
[c21]Daniel Caragata, Safwan El Assad, Charles A. Shoniregun, Galyna A. Akmayeva: UMTS security: Enhancement of identification, authentication and key agreement protocols. ICITST 2011: 278-282- 2010
[b3]Charles A. Shoniregun, Kudakwashe Dube, Fredrick Mtenzi: Electronic Healthcare Information Security. Advances in Information Security 53, Springer 2010, ISBN 978-0-387-84817-4, pp. 1-183
2000 – 2009
- 2009
[c20]Cyril Ehijie Azenabor, Mohammad Dastbaz, Charles A. Shoniregun, Chris Imafidon: The society and electronic government usage. ICITST 2009: 1-8
[c19]Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva: Mixed load balance strategy to improve performance efficacy for three tiers Peer-to-Peer network topology. ICITST 2009: 1-7
[c18]Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva, Ali Al-Dahoud: Applying semantic web and user behavior analysis to enforce the intrusion detection system. ICITST 2009: 1-5- 2008
[c17]Cyril Ehijie Azenabor, Charles A. Shoniregun: The Societal Dimension of e-Government in UK. CSREA EEE 2008: 23-28
[c16]Songhe Zhao, Charles A. Shoniregun, Chris Imafidon: Addressing the vulnerability of the 4-way handshake of 802.11i. ICDIM 2008: 351-356
[c15]
[c14]Samson Omosule, Charles A. Shoniregun, David Preston: A framework for culture influence Virtual Learning Environments trust. ICDIM 2008: 411-416
[c13]Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva: A NetFlow based internet-worm detecting system in large network. ICDIM 2008: 581-586
[c12]
[c11]Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva: A novel approach in securing DDoS attack. CSTST 2008: 59-64- 2007
[b2]Charles A. Shoniregun: Synchronizing Internet Protocol Security (SIPSec). Advances in Information Security 34, Springer 2007, ISBN 978-0-387-32724-2, pp. 1-218
[c10]
[c9]Daniel MacCormac, Fredrick Mtenzi, Mark Deegan, Brendan O'Shea, Charles A. Shoniregun: Towards local resource redirection across thin client protocols. ICDIM 2007: 165-172
[c8]- 2005
[b1]Charles A. Shoniregun: Impacts and Risk Assessment of Technology for Internet Security - Enabled Information Small-Medium Enterprises (TEISMES). Advances in Information Security 17, Springer 2005, ISBN 978-0-387-24343-6, pp. 1-196
[j5]Charles A. Shoniregun, Oleksandr Logvynovskiy, Kevin Lu: Securing XML Query Processing Storage. Australasian J. of Inf. Systems 13(1) (2005)
[c7]Charles A. Shoniregun, Ian Tindale, Alex Logvynovskiy, Terry Fanning: Securing Mobile Product Ecology for Mobile Commerce (mC). IEEE SCC 2005: 211-216
[c6]Ziyang Duan, Subhra Bose, Charles A. Shoniregun, Paul A. Stirpe, Alex Logvynovskiy: SOA Without Web Services: a Pragmatic Implementation of SOA for Financial Transactions Systems. IEEE SCC 2005: 243-250
[c5]Charles A. Shoniregun, Paul Smith, Alex Logvynovskiy, Vyacheslav Grebenyuk: Securing Organisational Internal E-Learning Development. ICALT 2005: 699-701
[c4]Charles A. Shoniregun, Ziyang Duan, Subhra Bose, Alex Logvynovskiy: A secure framework for managing transactional properties of business objects. ICETE 2005: 57-65
[c3]Charles A. Shoniregun, Paul Smith, Alex Logvynovskiy, Vyacheslav Grebenyuk: Impacts of E-Learning on Organisational Strategy. WEBIST 2005: 474-481- 2004
[j4]Charles A. Shoniregun, Oleksandr Logvynovskiy: Securing XML Documents. Australasian J. of Inf. Systems 12(1) (2004)
[j3]
[j2]Charles A. Shoniregun: An investigation of information systems project failure and its implication on organisations. IJSTM 5(1): 25-41 (2004)
[c2]
[c1]Charles A. Shoniregun, Adebola Omoegun, Diepriye Brown-West, Oleksandr Logvynovskiy: Can eCRM and Trust Improve eC Customer Base? CEC 2004: 303-310- 2003
[j1]Charles A. Shoniregun: Are existing internet security measures guaranteed to protect user identity in the financial services industry? IJSTM 4(2): 194-216 (2003)
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:19 CEST by the dblp team



