Now showing items 1-2 of 2

    • Email encryption with image steganography 

      Betariza, Alvin Alfred; Shanie, Godfrey; Musinguzi, Joseph; Kalanzi, Tonny (Makerere University, 2022-08)
      To be considered secure, a communication system needs to be subtle, discrete, legal, and easy to use. At some point in their life, many people had to converse covertly. Some individuals need secure communication because ...
    • A visualized network traffic monitoring tool. 

      Jollet Bogere, Nanyonyi; Clarissa, Bwire; Faith, Namuddu; Liz Takan, Asimo; Matthew, Kizito (Makerere University, 2022)
      In this study, Network Traffic Monitoring is enacted for information technicians in Uganda to easily enable them to Monitor traffic in their organization networks with a well simplified outlook of the network. This is ...