Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fredrick Mtenzi is active.

Publication


Featured researches published by Fredrick Mtenzi.


ad hoc networks | 2004

Optimized priority based energy efficient routing algorithm for mobile ad hoc networks

Xiaohai Wei; Guoliang Chen; Yingyu Wan; Fredrick Mtenzi

Abstract Recently more and more research interest focuses on the energy efficient routing in mobile ad hoc networks and many related routing algorithms are reported. In this paper, a new optimized priority based energy efficient routing algorithm is presented and priority is added to the existing routing algorithm according to the residual energy proportion of the nodes. Lower residual energy means lower priority and the nodes with lower priority are less likely to forward packets to other nodes. The algorithm needs no global information of the networks and only a little modification is needed to the existing algorithm, so it is practical to be implemented. The algorithm can improve the performance of routing discovery, routing maintenance and cache management at the same time. Some optimization strategy is taken to reduce the network overhead and the lifetime of the network is much longer and the network with our algorithm can transfer much more effective data. Simulation with NS-2 is done and satisfying results are obtained with this algorithm. The results show that the algorithm is efficient.


networked digital technologies | 2010

A Secured Mobile Payment Model for Developing Markets

Bossi Masamila; Fredrick Mtenzi; Jafari Said; Rose Tinabo

The evolution of mobile payments continues to take place at the great speed with changing business models and technology schemes. With the omnipresent availability of mobile phone and other mobile devices, mobile payment presents an investment opportunity to developing markets. However, the success of mobile payment depends on the security of the underlying technology and the associated business model. In this paper, a mobile payment model for developing market is discussed. This mobile payment model comprises the features that can accommodate secured local payments in remote locations with limited network coverage.


ubiquitous intelligence and computing | 2008

RFID: An Ideal Technology for Ubiquitous Computing?

Ciaran O'Driscoll; Daniel MacCormac; Mark Deegan; Fredrick Mtenzi; Brendan O'Shea

This paper presents a review of RFID based approaches used for the development of smart spaces and smart objects. We explore approaches that enable RFID technology to make the transition from the recognized applications such as retail to ubiquitous computing, in which computers and technology fade into the background of day to day life. In this paper we present the case for the use of RFID technology as a key technology of ubiquitous computing due to its ability to embed itself in everday objects and spaces. Frameworks to support the operation of RFID-based smart objects and spaces are discussed and key design concepts identified. Conceptual frameworks, based on academic research, and deployed frameworks based on real world implementations are reviewed and the potential for RFID as a truly ubiquitous technology is considered and presented.


networked digital technologies | 2009

Challenges to E-healthcare adoption in developing countries: A case study of Tanzania

Zanifa Omary; Dennis Lupiana; Fredrick Mtenzi; Bing Wu

The use of ICT in healthcare, which resulted into e-healthcare, has many benefits to both individuals and governments. These benefits include reduction in medical errors, improvements in physician efficiency and an increase in the quality of care delivered. Unfortunately, there are many challenges associated with electronic healthcare adoption. In this paper we investigate the challenges associated with electronic healthcare adoption in Tanzania, and propose solutions to them. The proposed solutions will help the Tanzanian government in its design and implementation of electronic healthcare projects.


international conference for internet technology and secured transactions | 2009

Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data

Rose Tinabo; Fredrick Mtenzi; Brendan O'Shea

Due to sensitivity nature of the data in e-healthcare and the need of these data to different “Healthcare Team”, privacy is one of the important issues to consider for its use. Without highly consideration of privacy issues, available data will not be useful. This results in introduction of different techniques that insist privacy protection. Anonymisation and Pseudonymisation are the main methods in privacy protection. Even though they both protect privacy, their usefulness may vary depending on the usage of the data, therefore users must be able to choose a technique to use. This paper compares characteristics of anonymisation and pseudonymisation techniques in e-healthcare. Depending on characteristics of e-healthcare data, authors proposes the use of pseudonymisation (the use of false names (pseudonym)), technique rather than anonymisation (without name) technique in e-healthcare as it will allow usage of the data to different “Healthcare Team” while protecting privacy of an individual. Also the use of different techniques to “Healthcare Team” has been proposed


Archive | 2010

Securing e-Healthcare Information

Charles A. Shoniregun; Kudakwashe Dube; Fredrick Mtenzi

Securing personal e-Healthcare information aims mainly at protecting the privacy and confidentiality of the individual who receives healthcare services that are delivered through e-Health. Advances in security technologies have so far not eliminated the challenge posed by the need to secure e-Healthcare information. The rate of privacy and confidentiality breaches continue to increase unabated. These breaches pose challenges to all domains that converge on the task of securing information and building trust in e-Healthcare information management. Only a holistic approach that positions itself at the point of convergence of the domains of law, organisational policy, professional ethics and IT security could offer the promise to mitigate, if not eliminate, the major challenges to securing e-Healthcare information.


grid and pervasive computing | 2007

A thin client approach to supporting adaptive session mobility

Daniel MacCormac; Mark Deegan; Fredrick Mtenzi; Brendan O'Shea

Recent growth in computing devices from the smartphone to the desktop computer has led to users interacting with multiple computing devices throughout the course of the day. Modern computing sessions are a graphically rich, multi-tasking experience, representing a considerable amount of state. There is seldom the ability to automatically move a session from one device to another; instead users must manually restore applications to their previous state. Without session mobility, the problems of unsynchronised information and communication barriers become apparent. We present a thin client approach to supporting session mobility across a broad range of devices. We use an adaptive approach, thereby supporting a fine granularity of devices. Furthermore, our approach enables rich diverse sessions composed of applications specific to a range of platforms, reducing constraints imposed by mobile devices, and boosting productivity by allowing access to a wider range of applications from a single device.


international conference for internet technology and secured transactions | 2014

Model for analysing Anti-Phishing Authentication Ceremonies

Edina Hatunic-Webster; Fredrick Mtenzi; Brendan O'Shea

Phishing takes advantage of the way humans interact with computers or interpret messages; and also that many online authentication protocols place a disproportional burden on human abilities. A security ceremony is an extension of the concept of network security protocol and includes user interface and human-protocol interaction. It is one way of extending the reach of current methods for social, technical and contextual analysis of security protocols to include humans. In this paper, we propose a Human Factors in Anti-Phishing Authentication Ceremonies (APAC) Framework for investigating phishing attacks in authentication ceremonies, which builds on The Human-in-the-Loop Security Framework of communication processing. We show how to apply the APAC framework to model human-protocol behaviour. The resulting Model for Analysing APAC correlates the framework components and examines how the authentication tasks required to be performed by humans influence their decision-making and consequently their phishing detection.


Archive | 2010

Secure e-Healthcare Information Systems

Charles A. Shoniregun; Kudakwashe Dube; Fredrick Mtenzi

The e-Healthcare information systems (e-HIS) are, by nature, network-based and internet-enabled. In the developed countries, e-HIS typically operate in regional networks and international health management organisations and trusts. Therefore, e-HIS must meet the requirements of new emerging paradigms and international organisational phenomenon. These requirements include the support for distribution, cooperation and communication. However, the success and acceptance of e- HIS may not be guaranteed in the absence of security and privacy service components, incorporation of standards-based interoperability that takes into account the legal, ethical and organisational policy provision. The typical e-HIS are e- Healthcare record systems (EHR systems) and electronic-personal healthcare record systems (EPHR systems). The EHR systems are created, maintained by clinicians and healthcare organisations, while EPHR systems are created, maintained and controlled, at least in theory, by the individual subject of the health information. The concept of the EHRs is fairly older than the concept of EPHR, which is emerging coupled with the patient-centred paradigm. Consequently, the EHR systems are fairly established as compared to EPHR systems which are starting to be introduced.


Archive | 2010

Introduction to e-Healthcare Information Security

Charles A. Shoniregun; Kudakwashe Dube; Fredrick Mtenzi

The e-Healthcare information offers unique security, privacy and confidentiality challenges that require a fresh examination of the mainstream concepts and approaches to information security. The significance of security and privacy in e- Healthcare information raised the issues of individual consent, confidentiality and privacy, which are the main determinants in adopting and successful utilising the e-Healthcare information. Current trends in the domain of e-Healthcare information management point to the need for comprehensive incorporation of security, privacy and confidentiality safeguards within the review of e-Healthcare information management frameworks and approaches. This raises major challenges that demands holistic approaches spanning a wide variety of legal, ethical, psychological, information and security engineering. This introductory chapter explores information security and challenges facing e-Healthcare information management.

Collaboration


Dive into the Fredrick Mtenzi's collaboration.

Top Co-Authors

Avatar

George S. Oreku

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Brendan O'Shea

Dublin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ciaran O'Driscoll

Dublin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Dennis Lupiana

Dublin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zanifa Omary

Dublin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Bing Wu

Dublin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Rose Tinabo

Dublin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Said Jafari

Dublin Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge