Recent Submissions

  • WLAN SECURITY: A TRUSTED COMPUTING BASE APPROACH 

    Mwathi, David Gitonga (2019-01)
    This paper identifies the gaps in IEEE 802.11 standards and supporting technologies and then proposes a conceptual architecture that can be used to develop a model for analyzing and predicting the security performance of ...
  • User’s perception on ICT adoption in High schools 

    Nchunge, David Mbabu; Sakwa, M.; Mwangi, W. (2012)
    Information Communication Technology (ICT) plays a crucial role in the effectiveness, efficiency and service delivery of any institution. ICT has also been credited with the potential to integrate world economies thus ...
  • Assessment of ICT Infrastructure on ICT Adoption in Educational Institutions 

    Nchunge, David Mbabu; Sakwa, M.; Mwangi, W. (2013-06)
    Globalization and liberalization have facilitated intensive business competition which in turn has increased the need for adoption of new technologies to increase the efficiency in service delivery. ICT has wide application ...
  • A Multi-Faceted Approach to Mobile Agent Security 

    Ngereki, Anthony M.; Kahonge, Andrew M. (2015-06)
    Mobile agents are increasingly becoming popular in the development of current distributed applications. However, the mobility and autonomy factors of mobile agents present a host of security challenges in a ...
  • Adoption of Near Field Communication in Universities in Kenya 

    Muthengi, Fredrick Mugambi; Njebiu, Victor Mwenda (2015-09)
    In our day to day life, the adoption of new technology to new innovation in various sectors is rising. Campus life has shifted from students’ carrying laptops and a bag full of pass cards to carrying Ipads or smart phones. ...
  • School ICT Policy, a Factor Influencing Implementation of Computer Studies Curriculum in Secondary Schools. 

    Murithi, Nathan 1* (2013)
    The introduction of ICT curriculum in education among schools in many countries was as a result of National ICT policy initiatives by the government. The National ICT curriculum differs from regions depending on the education ...
  • Algorithm for Selection of EAP Authentic 

    Mwathi, David Gitonga 1; Okello-Odongo, William 2 ,; Opiyo, Elisha 3 (2016-06)
    ABSTRACT Several recent studies indicate that many implementations of authentication and access control in public WLANs are compromisable. This is because IEEE 802.11 standard leaves the choice of EAP method to use to ...