Sha-1 and the strict avalanche criterion YM Motara, B Irwin 2016 Information security for South Africa (ISSA), 35-40, 2016 | 15 | 2016 |
Applying distributed ledger technology to digital evidence integrity WT Weilbach, YM Motara SAIEE Africa Research Journal 110 (2), 77-93, 2019 | 10 | 2019 |
File integrity checkers: State of the art and best practices YM Motara, BVW Irwin Information Security South Africa (ISSA), Johannesburg, 2005 | 6 | 2005 |
In-kernel cryptographic executable verification Y Motara, B Irwin Advances in Digital Forensics: IFIP International Conference on Digital …, 2005 | 4 | 2005 |
Preimages for SHA-1 YM Motara Ph. D. dissertation, Rhodes University, 2017 | 3 | 2017 |
SHA-1, SAT-solving, and CNF YM Motara, BVW Irwin | 3 | 2017 |
Gamification of functional programming TD Chifamba, YM Motara 2020 2nd International Multidisciplinary Information Technology and …, 2020 | 2 | 2020 |
String diagrams for modelling functional programming YM Motara 2020 2nd International Multidisciplinary Information Technology and …, 2020 | 2 | 2020 |
A functional ontology for information systems YM Motara, K Van der Schyff South African Computer Journal 31 (2), 57-76, 2019 | 2 | 2019 |
A functional ontology YM Motara, K van der Schyff Proceedings of the Annual Conference of the South African Institute of …, 2018 | 2 | 2018 |
Distributed ledger technology to support digital evidence integrity verification processes WT Weilbach, YM Motara International Information Security Conference, 1-15, 2018 | 2 | 2018 |
Functional programming and security YM Motara arXiv preprint arXiv:1201.5728, 2012 | 2 | 2012 |
High-Level Modelling for Typed Functional Programming YM Motara Trends in Functional Programming: 22nd International Symposium, TFP 2021 …, 2021 | 1 | 2021 |
Obstacles when teaching functional programming YM Motara Proceedings of the 9th Computer Science Education Research Conference, 1-2, 2020 | 1 | 2020 |
A structural modeling notation for the typed functional paradigm YM Motara Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1515-1522, 2020 | 1 | 2020 |
Development of an LCT-Based MOOC Taxonomy YM Motara Proceedings of the 7th Computer Science Education Research Conference, 35-43, 2018 | 1 | 2018 |
Identifying direct relatives of a social network site user and obtaining their personal contact details D Cull, MY Motara | | 2015 |
TinyP2P: A Decentralized User-Friendly Peer-to-Peer File-Sharing System N Reid, Y Motara | | 2015 |
File Integrity Checking YM Motara Rhodes University, 2005 | | 2005 |
Proposal: Kernel-based Cryptographic Pre-Execution Validation of ELF Object Files Y Motara | | 2004 |