default search action
Kester Quist-Aphetsi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c14]Bismark Tei Asare, Kester Quist-Aphetsi, Laurent Nana:
Towards a Secure Communication of Data in IoT Networks: A Technical Research Report. ICA3PP (3) 2020: 580-591
2010 – 2019
- 2016
- [c13]Quist-Aphetsi Kester:
An Integrated RoIP Communication Network for Effective Collaboration During Emergency and Disaster Management. AFRICOMM 2016: 174-185 - [c12]Quist-Aphetsi Kester:
Spatial Cryptographic and Watermarking Technique for Authentication and Security of Medical Images in a Cloud Based Health Information Systems. AFRICOMM 2016: 281-291 - [c11]Quist-Aphetsi Kester:
A Hybrid Lossy Compression Using 2-D Discrete Cosine Transform and Visual Cryptographic Technique for Security of Multimedia Image Data Communications in Internet of Things. AFRICOMM 2016: 292-303 - [c10]Quist-Aphetsi Kester:
Using Formal Concepts Analysis Techniques in Mining Data from Criminal Databases and Profiling Events Based on Factors to Understand Criminal Environments. ICCSA (5) 2016: 480-496 - 2015
- [c9]Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor:
A Security Technique for Authentication and Security of Medical Images in Health Information Systems. ICCSA (Short Papers/poster papers/PhD student showcase works) 2015: 8-13 - [c8]Quist-Aphetsi Kester, Anca Christine Pascu, Laurent Nana, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor:
Feature Based Encryption Technique for Securing Digital Image Data Based on FCA-Image Attributes and Visual Cryptography. ICCSA (4) 2015: 712-724 - [c7]Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor:
A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images. SSCC 2015: 89-98 - [c6]Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor:
A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images. SSCC 2015: 228-237 - [c5]Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor:
A Hybrid Image Cryptographic and Spatial Digital Watermarking Encryption Technique for Security and Authentication of Digital Images. UKSim 2015: 322-326 - [c4]Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor:
A Novel Hybrid Discrete Cosine Transformation and Visual Cryptographic Technique for Securing Digital Images. UKSim 2015: 327-332 - 2014
- [c3]Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor:
A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel Displacement. SNDS 2014: 530-539 - 2013
- [c2]Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu:
A Novel Cryptographic Encryption Technique for Securing Digital Images in the Cloud Using AES and RGB Pixel Displacement. EMS 2013: 293-298 - [c1]Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire:
A New Encryption Cipher for Securing Digital Images of Video Surveillance Devices Using Diffie-Hellman-MD5 Algorithm and RGB Pixel Shuffling. EMS 2013: 305-311 - [i10]Quist-Aphetsi Kester:
A cryptographic image encryption technique for facial-blurring of images. CoRR abs/1307.6409 (2013) - [i9]Quist-Aphetsi Kester:
A Hybrid Cryptosystem Based On Vigenere Cipher and Columnar Transposition Cipher. CoRR abs/1307.7786 (2013) - [i8]Quist-Aphetsi Kester, Koumadi, Koudjo M, Nii Narku Quaynor:
An Integrated Geographic Information System and Marketing Information System Model. CoRR abs/1307.7787 (2013) - [i7]Quist-Aphetsi Kester:
Computer Aided Investigation: Visualization and Analysis of data from Mobile communication devices using Formal Concept Analysis. CoRR abs/1307.7788 (2013) - [i6]Quist-Aphetsi Kester:
The Role of Rural Banks in Providing Mobile Money Services to Rural Poor Communities: An effective integration approach of Rural Banks and existing mobile communications infrastructure. CoRR abs/1307.7789 (2013) - [i5]Quist-Aphetsi Kester:
Using SOA with Web Services for effective Integration of Hospital Information Systems via an Enterprise Service Bus. CoRR abs/1307.7790 (2013) - [i4]Quist-Aphetsi Kester:
A Visual Cryptographic Encryption Technique for Securing Medical Images. CoRR abs/1307.7791 (2013) - [i3]Quist-Aphetsi Kester:
Visualization and Analysis of Geographical Crime Patterns Using Formal Concept Analysis. CoRR abs/1307.8112 (2013) - [i2]Quist-Aphetsi Kester, Ajibade Ibrahim Kayode:
Using SOA with Web Services for effective data integration of Enterprise Pharmaceutical Information Systems. CoRR abs/1307.8179 (2013) - [i1]Quist-Aphetsi Kester:
Criminal Geographical Profiling: Using FCA for Visualization and Analysis of Crime Data. CoRR abs/1310.0864 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint