Follow
Anael Sam
Title
Cited by
Cited by
Year
Two-factor authentication scheme for mobile money: A review of threat models and countermeasures
G Ali, M Ally Dida, A Elikana Sam
Future Internet 12 (10), 160, 2020
692020
Security Perspectives for USSD versus SMS in conducting mobile transactions: A case study of Tanzania
B Nyamtiga, A Sam, L Laizer
IJTEEE, 2013
542013
Enhanced security model for mobile banking systems in Tanzania
B Nyamtiga, A Sam, L Laizer
IJTEEE, 2013
452013
Diabetes forecasting using supervised learning techniques
SA Diwani, A Sam
Adv Comput Sci an Int J 3, 10-18, 2014
422014
A review on healthcare information systems and consensus protocols in blockchain technology
C Kombe, M Dida, A Sam
International Journal of Advanced Technology and Engineering Exploration 5 …, 2018
402018
A secure and efficient multi-factor authentication algorithm for mobile money applications
G Ali, MA Dida, A Elikana Sam
Future Internet 13 (12), 299, 2021
342021
Evaluation of key security issues associated with mobile money systems in Uganda
G Ali, M Ally Dida, A Elikana Sam
Information 11 (6), 309, 2020
342020
Overview applications of data mining in health care: The case study of Arusha region
S Diwani, S Mishol, D Kayange, D Machuve, A Sam
IJCER, 2013
332013
Performance Analysis of Carrier Aggregation for Various Mobile Network Implementations Scenario Based on Spectrum Allocated
ASEM Liston Kiwoli
International Journal of Wireless & Mobile Networks (IJWMN) 9 (5), 42-53, 2017
26*2017
Blockchain Technology in Sub-Saharan Africa: Where does it fit in Healthcare Systems: A case of Tanzania
C Kombe, A Sam, M Ally, A Finne
Journal of Health Informatics in Developing Countries 13 (2), 2019
212019
Evaluation of Users’ Knowledge and Concerns of Biometric Passport Systems
T Habibu, E Luhanga, AE Sam
Data 4 (2), 1-17, 2019
202019
Assessment of Vulnerabilities of the Biometric Template Protection Mechanism
T Habibu, AE Sam
International Journal of Advanced Technology and Engineering Exploration …, 2018
162018
Heuristic evaluation and usability testing of G-MoMo applications
G Ali, M Dida, A Sam
IADITI, 2022
122022
Performance Comparison of Ensemble Learning and Supervised Algorithms in Classifying Multi-label Network Traffic Flow
M Machoke, J Mbelwa, J Agbinya, AE Sam
Engineering, Technology & Applied Science Research 12 (3), 8667-8674, 2022
112022
A study of users’ compliance and satisfied utilization of biometric application system
T Habibu, ET Luhanga, AE Sam
Information Security Journal: A Global Perspective 30 (3), 125-138, 2021
102021
Early fire detection system in tanzania markets
R Hilary, P Rotich, A Geofrey, A Sam
Engineering Proceedings 2 (1), 50, 2020
102020
An Online Collaborative Discussion Platform for Bridging a Technological Reliance Gap in Higher Learning Institutions in Tanzania
L John, AE Sam
Modern Education and Computer Science Press, 2018
102018
Forward Error Correction Convolutional Codes for RTAs' Networks: An Overview
SI Mrutu, A Sam, NH Mvungi
International Journal of Computer Network and Information Security 6 (7), 19, 2014
102014
Development of innovative secured remote sensor water quality monitoring & management system: case of Pangani water basin
K Mwemezi, A Sam
Modern Education and Computer Science Press, 2019
92019
Safety Zone Determination For Wireless Cellular Tower-A Case Study From Tanzania
C Nyakyi, S Mrutu, A Sam, J Anatory
IJRET, 2013
92013
The system can't perform the operation now. Try again later.
Articles 1–20