Skip to content

Technical reports

2001-2010-2015

  1. Shoniregun C.A., (2010-2015), ‘Cyber Security Paradigm’, Technical Report: Infonomics Society.

2001-2010

  1. Shoniregun C.A., (2007-2010), ‘Security of Electronic Information on the Internet: Comparison between Canada and UK’, Technical Report: Infonomics Society.
  2. Shoniregun C.A., (2006), ‘Model Analysis of Data Security using Biomerics’, Technical Report: Uel.
  3. Shoniregun C.A. (2005), ‘Transactions Analysis of Security Errors’, Technical Report: Uel.
  4. Shoniregun C.A. (2005), ‘Information Security Tag’, Technical Report: UeL.
  5. Shoniregun C.A. (2004), ‘Data Security’, Technical Report: Independent Financial Consultancy.
  6. Shoniregun C.A. and Wilson I. (2003), ‘Secured Internet transactions’, Technical Report: Independent Financial Consultancy.
  7. Shoniregun C.A. and Carl F. (2002), ‘Misconceptions of rollback has a security measures’, Technical Report: Independent Financial Consultancy.
  8. Shoniregun C.A. (2001), ‘Delimiting factors of cryptography in e-Commerce’, Technical Report: General computers.
  9. Shoniregun C.A. (2001), ‘Impacts and security issues of e-Commerce in the UK’ Technical Report: Independent Research.

1990–2000

  1. Shoniregun C.A. and Dimitris K. (2000), ‘Security of electronic transactions’, Technical Report: General computers.
  2. Shoniregun C.A. (1998), ‘Security of computer information storage’, Technical Report: Service Centre Projects (SCP).
  3. Shoniregun C.A. (1997), ‘Hardware security evaluation’, Technical Report: MG Rover.
  4. Shoniregun C.A. (1996), ‘Performance evaluation of control Network’, Technical Report: MG Rover.
  5. Shoniregun C.A. (1996), ‘Security of real-time operational system’, Technical Report: MG Rover.
  6. Shoniregun C.A.Milton O., and McGill R. (1995), ‘AI mechanism for securing customer efficient authentication’, Technical Report: Business Communication (BC).
  7. Shoniregun C.A. (1994), ‘Security of the middle-ware resource management’, Technical Report: Commercial Marketing (CM) and Business Communication (BC).
  8. Shoniregun C.A. (1994), ‘Customer service systems application security’, Technical Report: Business Communication (BC).
  9. Shoniregun C.A. (1993), ‘Authentication and integrity for services requirements system access’, Technical Report: Business Communication (BC).
  10. Shoniregun C.A. (1993), ‘Fault tolerance of data transactions’, Technical Report: Business Communication (BC).
  11. Shoniregun C.A. and Lucas J. (1992), ‘Software and hardware security of customer service systems (CSS)’, Technical Report: Business Communication (BC).
  12. Shoniregun C.A. and Lucas J. (1992), ‘Network security of customer service systems (CSS)’, Technical Report: Business Communication (BC).
  13. Shoniregun C.A. (1991), ‘Security of DX switches’, Technical Report: Service Centre Projects (SCP).
  14. Shoniregun C.A. (1990), ‘Security of Monarch support systems’, Technical Report: Service Centre Projects (SCP).

‘Your manuscript is both good and original; but the part that is good is not original, and the part that is original is not good.’

Copyright © C.A.Shoniregun