Follow
Yusuf Moosa Motara
Yusuf Moosa Motara
Senior Lecturer, Rhodes University
Verified email at ru.ac.za
Title
Cited by
Cited by
Year
Sha-1 and the strict avalanche criterion
YM Motara, B Irwin
2016 Information security for South Africa (ISSA), 35-40, 2016
152016
Applying distributed ledger technology to digital evidence integrity
WT Weilbach, YM Motara
SAIEE Africa Research Journal 110 (2), 77-93, 2019
102019
File integrity checkers: State of the art and best practices
YM Motara, BVW Irwin
Information Security South Africa (ISSA), Johannesburg, 2005
62005
In-kernel cryptographic executable verification
Y Motara, B Irwin
Advances in Digital Forensics: IFIP International Conference on Digital …, 2005
42005
Preimages for SHA-1
YM Motara
Ph. D. dissertation, Rhodes University, 2017
32017
SHA-1, SAT-solving, and CNF
YM Motara, BVW Irwin
32017
Gamification of functional programming
TD Chifamba, YM Motara
2020 2nd International Multidisciplinary Information Technology and …, 2020
22020
String diagrams for modelling functional programming
YM Motara
2020 2nd International Multidisciplinary Information Technology and …, 2020
22020
A functional ontology for information systems
YM Motara, K Van der Schyff
South African Computer Journal 31 (2), 57-76, 2019
22019
A functional ontology
YM Motara, K van der Schyff
Proceedings of the Annual Conference of the South African Institute of …, 2018
22018
Distributed ledger technology to support digital evidence integrity verification processes
WT Weilbach, YM Motara
International Information Security Conference, 1-15, 2018
22018
Functional programming and security
YM Motara
arXiv preprint arXiv:1201.5728, 2012
22012
High-Level Modelling for Typed Functional Programming
YM Motara
Trends in Functional Programming: 22nd International Symposium, TFP 2021 …, 2021
12021
Obstacles when teaching functional programming
YM Motara
Proceedings of the 9th Computer Science Education Research Conference, 1-2, 2020
12020
A structural modeling notation for the typed functional paradigm
YM Motara
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1515-1522, 2020
12020
Development of an LCT-Based MOOC Taxonomy
YM Motara
Proceedings of the 7th Computer Science Education Research Conference, 35-43, 2018
12018
Identifying direct relatives of a social network site user and obtaining their personal contact details
D Cull, MY Motara
2015
TinyP2P: A Decentralized User-Friendly Peer-to-Peer File-Sharing System
N Reid, Y Motara
2015
File Integrity Checking
YM Motara
Rhodes University, 2005
2005
Proposal: Kernel-based Cryptographic Pre-Execution Validation of ELF Object Files
Y Motara
2004
The system can't perform the operation now. Try again later.
Articles 1–20