ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2016 Information Security for South Africa (ISSA)
Latest Publications
TOTAL DOCUMENTS
26
(FIVE YEARS 0)
H-INDEX
3
(FIVE YEARS 0)
Published By IEEE
9781509024735
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Title page
2016 Information Security for South Africa (ISSA)
◽
10.1109/issa.2016.7802914
◽
2016
◽
Keyword(s):
Title Page
Download Full-text
CDMA in signal encryption and information security
2016 Information Security for South Africa (ISSA)
◽
10.1109/issa.2016.7802929
◽
2016
◽
Author(s):
Olanrewaju B. Wojuola
◽
Stanley H. Mneney
◽
Viranjay M. Srivastava
Keyword(s):
Information Security
◽
Signal Encryption
Download Full-text
Conference committees
2016 Information Security for South Africa (ISSA)
◽
10.1109/issa.2016.7802919
◽
2016
◽
Keyword(s):
Conference Committees
Download Full-text
An interactive visual library model to improve awareness in handling of business information
2016 Information Security for South Africa (ISSA)
◽
10.1109/issa.2016.7802924
◽
2016
◽
Author(s):
Petrus M.J. Delport
◽
Mariana Gerber
◽
Nader S. Safa
Keyword(s):
Business Information
Download Full-text
Copyright page
2016 Information Security for South Africa (ISSA)
◽
10.1109/issa.2016.7802916
◽
2016
◽
Download Full-text
Effect of varying node mobility in the analysis of black hole attack on MANET reactive routing protocols
2016 Information Security for South Africa (ISSA)
◽
10.1109/issa.2016.7802930
◽
2016
◽
Cited By ~ 2
Author(s):
Lineo Mejaele
◽
Elisha Oketch Ochola
Keyword(s):
Black Hole
◽
Routing Protocols
◽
Node Mobility
◽
Black Hole Attack
◽
Reactive Routing
Download Full-text
Context Aware Mobile Application for mobile devices
2016 Information Security for South Africa (ISSA)
◽
10.1109/issa.2016.7802933
◽
2016
◽
Author(s):
Mfundo Masango
◽
Francois Mouton
◽
Alastair Nottingham
◽
Jabu Mtsweni
Keyword(s):
Mobile Devices
◽
Mobile Application
◽
Context Aware
Download Full-text
PoPI Act - opt-in and opt-out compliance from a data value chain perspective: A South African insurance industry experiment
2016 Information Security for South Africa (ISSA)
◽
10.1109/issa.2016.7802923
◽
2016
◽
Cited By ~ 1
Author(s):
Paulus Swartz
◽
Adele Da Veiga
Keyword(s):
South African
◽
Value Chain
◽
Insurance Industry
◽
Opt Out
◽
Data Value
Download Full-text
Reviewers
2016 Information Security for South Africa (ISSA)
◽
10.1109/issa.2016.7802920
◽
2016
◽
Download Full-text
SHA-1 and the Strict Avalanche Criterion
2016 Information Security for South Africa (ISSA)
◽
10.1109/issa.2016.7802926
◽
2016
◽
Cited By ~ 1
Author(s):
Yusuf Moosa Motara
◽
Barry Irwin
Keyword(s):
Strict Avalanche Criterion
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close