Fredrick Mtenzi

Orcid: 0000-0003-3361-9056

According to our database1, Fredrick Mtenzi authored at least 36 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The Conceptual Framing, Design, and Development of Mobile-Mediated Professional Development for Primary Mathematics Teachers.
Int. J. Mob. Blended Learn., 2023

2019
Energy-Efficient Load Balancing Ant Based Routing Algorithm for Wireless Sensor Networks.
IEEE Access, 2019

2018
Energy Efficient Hybrid Routing Protocol Based on the Artificial Fish Swarm Algorithm and Ant Colony Optimisation for WSNs.
Sensors, 2018

2017
A Software Development Process for Freshman Undergraduate Students.
Proceedings of the Tomorrow's Learning: Involving Everyone. Learning with and about Technologies and Computing, 2017

2016
A New Educational Mobile Devices Platform for Social Inclusion in Tanzania.
Int. J. ICT Res. Afr. Middle East, 2016

KiCM: A knowledge-intensive context model.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

Understanding the Everyday Designer in Organisations.
Proceedings of the Tackling Society's Grand Challenges with Design Science, 2016

Towards Reusable Personas for Everyday Design.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2014
Model for analysing Anti-Phishing Authentication Ceremonies.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

2013
A viewpoint of Tanzania e-commerce and implementation barriers.
Comput. Sci. Inf. Syst., 2013

Energy overhead of the graphical user interface in server operating systems.
Proceedings of the ACM Annual Conference on Special Interest Group on University and College Computing Services, 2013

Characterisation of Knowledge Incorporation into Solution Models for the Meal Planning Problem.
Proceedings of the Foundations of Health Information Engineering and Systems, 2013

2012
Black hat training of white hat resources: The future of security is gaming.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2010
Electronic Healthcare Information Security
Advances in Information Security 53, Springer, ISBN: 978-0-387-84817-4, 2010

V-isoNet: A Virtualised and Isolated Network using Open Source Technologies.
J. Digit. Inf. Manag., 2010

A Secured Mobile Payment Model for Developing Markets.
Proceedings of the Networked Digital Technologies - Second International Conference, 2010

Accessing sensitive patient information in ubiquitous healthcare systems.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Defending privacy: The development and deployment of a darknet.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Strictly alphanumeric data: Improving privacy in smart environments.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Privacy metrics in ubiquitous computing applications.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

2009
State of Tanzania e-readiness and e-commerce: Overview.
Inf. Technol. Dev., 2009

Multiple Anonymisation Techniques can balance Data Usefulness and 218Protection of Personal Identifiable Information (PII).
Int. J. Web Appl., 2009

Characterising Ubiquitous Computing Environments.
Int. J. Web Appl., 2009

Language based information routing security: policy enforcement.
Int. Arab J. Inf. Technol., 2009

Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

How does politics affect electronic healthcare adoption.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Dataset threshold for the performance estimators in supervised machine learning experiments.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

An approach for developing comparative security metrics for healthcare organizations.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Using Nature to Best Clarify Computer Security and Threats.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Intrusion Detection Based on Data Mining.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

2008
RFID: An Ideal Technology for Ubiquitous Computing?.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

2007
End user Authentication (EUA).
Proceedings of the WEBIST 2007, 2007

Towards local resource redirection across thin client protocols.
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007

A Thin Client Approach to Supporting Adaptive Session Mobility.
Proceedings of the Advances in Grid and Pervasive Computing, 2007

2005
Distributed Construction of Weakly Connected Dominating Sets for Clustering Mobile Ad Hoc Networks.
J. Digit. Inf. Manag., 2005

2004
Optimized priority based energy efficient routing algorithm for mobile ad hoc networks.
Ad Hoc Networks, 2004


  Loading...