The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Charles A. Shoniregun: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Charles A. Shoniregun
    Classification and taxonomy of TEISMEs. [Citation Graph (0, 0)][DBLP]
    ICEC, 2004, pp:196-200 [Conf]
  2. Ziyang Duan, Subhra Bose, Charles A. Shoniregun, Paul A. Stirpe, Alex Logvynovskiy
    SOA Without Web Services: a Pragmatic Implementation of SOA for Financial Transactions Systems. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2005, pp:243-250 [Conf]
  3. Charles A. Shoniregun, Ian Tindale, Alex Logvynovskiy, Terry Fanning
    Securing Mobile Product Ecology for Mobile Commerce (mC). [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2005, pp:211-216 [Conf]
  4. Charles A. Shoniregun, Paul Smith, Alex Logvynovskiy, Vyacheslav Grebenyuk
    Securing Organisational Internal E-Learning Development. [Citation Graph (0, 0)][DBLP]
    ICALT, 2005, pp:699-701 [Conf]
  5. Charles A. Shoniregun, Ziyang Duan, Subhra Bose, Alex Logvynovskiy
    A secure framework for managing transactional properties of business objects. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:57-65 [Conf]
  6. Charles A. Shoniregun, Paul Smith, Alex Logvynovskiy, Vyacheslav Grebenyuk
    Impacts of E-Learning on Organisational Strategy. [Citation Graph (0, 0)][DBLP]
    WEBIST, 2005, pp:474-481 [Conf]
  7. Charles A. Shoniregun, Adebola Omoegun, Diepriye Brown-West, Oleksandr Logvynovskiy
    Can eCRM and Trust Improve eC Customer Base? [Citation Graph (0, 0)][DBLP]
    CEC, 2004, pp:303-310 [Conf]
  8. Songhe Zhao, Charles A. Shoniregun
    Critical Review of Unsecured WEP. [Citation Graph (0, 0)][DBLP]
    IEEE SCW, 2007, pp:368-374 [Conf]

  9. The Societal Dimension of e-Government in UK. [Citation Graph (, )][DBLP]


  10. Towards local resource redirection across thin client protocols. [Citation Graph (, )][DBLP]


  11. Electronic government paradigm. [Citation Graph (, )][DBLP]


  12. Addressing the vulnerability of the 4-way handshake of 802.11i. [Citation Graph (, )][DBLP]


  13. A framework for culture influence Virtual Learning Environments trust. [Citation Graph (, )][DBLP]


  14. A NetFlow based internet-worm detecting system in large network. [Citation Graph (, )][DBLP]


  15. The softphone security. [Citation Graph (, )][DBLP]


  16. A novel approach in securing DDoS attack. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002