Browsing by Title
Now showing items 2560-2579 of 3023
-
A Sandboxing based security model to contain malicious traffic in smart homes
(Strathmore University, 2017)The Internet of Things (lOT) is a developing Next Generation Network (NGN) paradigm that aims to have more devices connected to the Internet and the possibility of these devices to autonomously communicate with each other. ... -
Scalable dataspace construction
(Strathmore University, 2017)This paper proposes the design and implementation of scalable dataspaces based on efficient data structures. Dataspaces are often likely to exhibit a multidimensional structure due to the unpredictable neighbour relationship ... -
The Sceptical challenge
(Routledge, 1997) -
A Scheme for improving data confidentiality in the cloud computing environment
(Strathmore University, 2017)Cloud computing has ushered in an era whereby small and medium sized companies enjoy computing power which was usually a preserve for big corporations. Despite these benefits, the present cloud data confidentiality techniques ... -
Scientific method : an historical and philosophical introduction
(Routledge, 1996) -
Scientific realism : how science tracks truth
(Routledge, 1965) -
Scientism : philosophy and the infatuation with science
(Routledge, 1991) -
Section 43(5) of the sexual offences act: the legal dispensation for marital rape in kenya
(Strathmore University, 2017-01)Law is an instrument to effect change in society and to protect rights of the marginalized. Where law fails to do this, its objects fail to be realized. The Constitution of Kenya provides for gender equality and the freedom ... -
A Sectoral analysis of the impact of foreign aid on public investment and economic growth in Kenya
(Strathmore University, 2016)The purpose of this study was to find out the effectiveness of foreign aid in boosting economic growth in Kenya and its impact on public investment. This paper uses an Autoregressive Distributed Lag (ARDL) Model to estimate ... -
Sectoral public investment on economic growth
(Strathmore University, 2016)The purpose of this study was to find out the impact of sectoral public investment on economic growth in Kenya. This paper uses a Vector Autoregressive (VAR) Model to analyze the impact of sectoral public expenditure on ... -
A Secure and verifiable internet voting system using homomorphic scheme.
(Strathmore University, 2009)Institutions are changed with the actions of ensuring the rights of its members to participate in a democratic election, this is surpassing all the limitations of the traditional voting system, and the development of an ... -
The Secure distributed data exchange protocol
(Strathmore University, 2017)Distributed protocols implementations over a large network is a well-studied problem that converges asymptotically; however, existing protocols do not provide a way for each node to distributively detect the level of trust ... -
A Secure electronic document management system using public key encryption: a case of Strathmore University
(Strathmore University, 2018)The need to safeguard and ensure the authenticity of academic records is paramount for any reputable educational institution. As institutions are moving into the digital era, more and more documents are being stored in ... -
A Secure end to end verifiable e-voting system using cryptography: a case of Independent Electoral and Boundaries Commission of Kenya
(Strathmore University, 2019)Elections that are run purely on manual voting system have presented a plethora of challenges that have often affected the credibility of elections done entirely using the traditional manual voting system. Countries round ... -
A Secure M-payment for M-commerce in Kenya
(Strathmore University, 2008)There has been a tremendous growth in mobile communications in Kenya over the last decade that has totally transformed how people communicate. This has presented opportunities for business to change how they operate, which ... -
Secure plugin for automated software updates using Public Key Infrastructure for embedded systems
(Strathmore University, 2018)Embedded systems are the driving force for technological development in many domains such as automotive, healthcare, and industrial control in the emerging post-PC era. As more and more computational and networked devices ... -
Secure plugin for automated software updates using public key infrastructure for embedded systems
(Strathmore University, 2018)The aim of the research is to investigate how software updates are delivered and identify gaps and challenges in updating software in embedded systems, design and implement an automated PKI based updates plugin for embedded ... -
Secured web service model for public service interoperability : case of Kenya’s e-government
(Strathmore University, 2014)A major challenge in E-government application developments for better service delivery is inadequate security features in e-government. This results in untrustworthy websites with stunted growth so that most e-government ... -
Securing a "Bring Your Own Application" cloud environment using digital forensics
(Strathmore University, 2018)The use of cloud applications introduces new challenges to information systems Security. The idea of applications accessible from multiple devices and hosted or provided by third party organizations brings new complications ... -
Securing Land Rights in Community Forests: Assessment of Article 63(2)(d) of the Constitution
Forests provide environmental, socio-cultural and economic benefits to mankind. They are particularly important to forest dwellers and hunter-gatherers as they derive their livelihoods from there and consider them as their ...