Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Fredrick Mtenzi
Fredrick Japhet Mtenzi
2010 – today
- 2013
[j8]George S. Oreku, Fredrick Japhet Mtenzi, Al-Dahoud Ali: A viewpoint of Tanzania e-commerce and implementation barriers. Comput. Sci. Inf. Syst. 10(1): 263-281 (2013)- 2012
[c16]Jason Flood, Mark Denihan, Anthony Keane, Fredrick Mtenzi: Black hat training of white hat resources: The future of security is gaming. ICITST 2012: 488-491- 2010
[b1]Charles A. Shoniregun, Kudakwashe Dube, Fredrick Mtenzi: Electronic Healthcare Information Security. Advances in Information Security 53, Springer 2010, ISBN 978-0-387-84817-4, pp. 1-183
[j7]Michael Gleeson, David Markey, Fredrick Mtenzi: V-isoNet: A Virtualised and Isolated Network using Open Source Technologies. JDIM 8(2): 95-100 (2010)
[c15]Said Jafari, Fredrick Mtenzi, Ciaran O'Driscoll, Ronan Fitzpatrick, Brendan O'Shea: Privacy metrics in ubiquitous computing applications. ICITST 2010: 1-2
[c14]Dennis Lupiana, Fredrick Mtenzi, Ciaran O'Driscoll, Brendan O'Shea: Strictly alphanumeric data: Improving privacy in smart environments. ICITST 2010: 1-3
[c13]Conor Mc Manamon, Fredrick Mtenzi: Defending privacy: The development and deployment of a darknet. ICITST 2010: 1-6
[c12]Zanifa Omary, Fredrick Mtenzi, Bing Wu, Ciaran O'Driscoll: Accessing sensitive patient information in ubiquitous healthcare systems. ICITST 2010: 1-3
[c11]Bossi Masamila, Fredrick Mtenzi, Said Jafari, Rose Tinabo: A Secured Mobile Payment Model for Developing Markets. NDT (1) 2010: 175-182
2000 – 2009
- 2009
[j6]George S. Oreku, Jianzhong Li, Fredrick Mtenzi: Language based information routing security: policy enforcement. Int. Arab J. Inf. Technol. 6(1): 91-98 (2009)
[j5]Rose Tinabo, Fredrick Mtenzi, Ciaran O'Driscoll, Brendan O'Shea: Multiple Anonymisation Techniques can balance Data Usefulness and 218Protection of Personal Identifiable Information (PII). IJWA 1(4): 218-227 (2009)
[j4]Dennis Lupiana, Ciaran O'Driscoll, Fredrick Mtenzi: Characterising Ubiquitous Computing Environments. IJWA 1(4): 253-262 (2009)
[c10]George S. Oreku, Fredrick Japhet Mtenzi: Intrusion Detection Based on Data Mining. DASC 2009: 696-701
[c9]George S. Oreku, Fredrick Mtenzi: Using Nature to Best Clarify Computer Security and Threats. DASC 2009: 702-707
[c8]Said Jafari, Fredrick Mtenzi, Ronan Fitzpatrick, Brendan O'Shea: An approach for developing comparative security metrics for healthcare organizations. ICITST 2009: 1-6
[c7]Zanifa Omary, Fredrick Mtenzi: Dataset threshold for the performance estimators in supervised machine learning experiments. ICITST 2009: 1-8
[c6]Zanifa Omary, Fredrick Mtenzi, Bing Wu: How does politics affect electronic healthcare adoption. ICITST 2009: 1-8
[c5]Rose Tinabo, Fredrick Mtenzi, Brendan O'Shea: Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data. ICITST 2009: 1-6- 2008
[c4]Ciaran O'Driscoll, Daniel MacCormac, Mark Deegan, Fredrick Mtenzi, Brendan O'Shea: RFID: An Ideal Technology for Ubiquitous Computing?. UIC 2008: 490-504- 2007
[c3]Daniel MacCormac, Mark Deegan, Fredrick Mtenzi, Brendan O'Shea: A Thin Client Approach to Supporting Adaptive Session Mobility. GPC 2007: 694-701
[c2]Daniel MacCormac, Fredrick Mtenzi, Mark Deegan, Brendan O'Shea, Charles A. Shoniregun: Towards local resource redirection across thin client protocols. ICDIM 2007: 165-172
[c1]George S. Oreku, Jianzhong Li, Fredrick Japhet Mtenzi: End user Authentication (EUA). WEBIST (1) 2007: 406-409- 2005
[j3]Fredrick Mtenzi: Distributed Construction of Weakly Connected Dominating Sets for Clustering Mobile Ad Hoc Networks. JDIM 3(3) (2005)
[j2]Fredrick Japhet Mtenzi: Distributed Construction of Weakly Connected Dominating Sets for Clustering Mobile Ad hoc Networks. JDIM 3(4): 241-243 (2005)- 2004
[j1]Xiaohai Wei, Guoliang Chen, Yingyu Wan, Fredrick Mtenzi: Optimized priority based energy efficient routing algorithm for mobile ad hoc networks. Ad Hoc Networks 2(3): 231-239 (2004)
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:24 CEST by the dblp team



