Follow
Mary Agoyi
Title
Cited by
Cited by
Year
SMS security: an asymmetric encryption approach
M Agoyi, D Seral
2010 6th International Conference on Wireless and Mobile Communications, 448-452, 2010
1002010
A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition
M Agoyi, E Çelebi, G Anbarjafari
Signal, Image and Video Processing 9, 735-745, 2015
772015
Robust non-blind color video watermarking using QR decomposition and entropy analysis
P Rasti, S Samiei, M Agoyi, S Escalera, G Anbarjafari
Journal of Visual Communication and Image Representation 38, 838-847, 2016
732016
A Hybrid Wormhole Attack Detection in Mobile Ad-Hoc Network (MANET)
M Tahboush, M Agoyi
IEEE Access 9, 11872-11883., 2021
622021
Sustainable adoption of E-government from the UTAUT perspective
M Zeebaree, M Agoyi, M Aqel
Sustainability 14 (9), 5370, 2022
302022
Examining factors influencing e-learning engagement among university students during covid-19 pandemic: A mediating role of “learning persistence”
I Adeshola, M Agoyi
Interactive Learning Environments 31 (10), 6195-6222, 2023
292023
A biometrics approach to population census and national identification in Nigeria: A prerequisite for planning and development
AT Eniayejuni, M Agoyi
Asian Transactions on Basic and Applied Sciences 1 (5), 60-67, 2011
292011
A Robust Color Image Watermarking Scheme Using Entropy and QR Decomposition.
L Laur, P Rasti, M Agoyi, G Anbarjafari
Radioengineering 24 (4), 2015
272015
Integrating Digital Innovation Capabilities Towards Value Creation: A Conceptual View
SA Edu, M Agoyi, DQ Agozie
Journal Of Intelligent Information Technologies 16 (4), 37- 50, 2020
262020
Assessing faculty’s use of social network tools in Libyan higher education via a technology acceptance model
I Aburagaga, M Agoyi, I Elgedawy
IEEE Access 8, 116415-116430, 2020
252020
Colour image blind watermarking scheme based on fast walsh hadamard transform and hessenberg decomposition
O Abodena, M Agoyi
Studies in Informatics and Control 27 (3), 339-348, 2018
212018
Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis
AS Edu, M Agoyi, D Agozie
PeerJ Computer Science 7, e658, 2021
192021
Linking FOMO and smartphone use to social media brand communities
OS Osemeahon, M Agoyi
Sustainability 12 (6), 2166, 2020
192020
Social TV engagement for increasing and sustaining social TV viewers
O Odunaiya, M Agoyi, OS Osemeahon
Sustainability 12 (12), 4906, 2020
162020
Review of security issues in e-Healthcare and solutions
PE Idoga, M Agoyi, EY Coker-Farrell, OL Ekeoma
2016 HONET-ICT, 118-121, 2016
142016
Robust grayscale watermarking technique based on face detection
L Laur, M Daneshmand, M Agoyi, G Anbarjafari
2015 23nd Signal Processing and Communications Applications Conference (SIU …, 2015
122015
Hybrid technique for robust image watermarking using discrete time fourier transform
O Abodena, M Agoyi, E Celebi
2017 25th Signal Processing and Communications Applications Conference (SIU …, 2017
112017
The use of SMS encrypted message to secure automatic teller machine
M Agoyi, D Seral
Procedia Computer Science 3, 1310-1314, 2011
112011
Digitalization and the environment: The role of information and communication technology and environmental taxes in European countries
I Adeshola, O Usman, M Agoyi, AA Awosusi, TS Adebayo
Natural Resources Forum, 2023
72023
Multistage Security Detection in Mobile Ad-Hoc Network (MANET).
M Tahboush, M Agoyi, A Esaid
International Journal of Engineering Trends and Technology 68 (11), 97 -104, 2020
52020
The system can't perform the operation now. Try again later.
Articles 1–20