Two-factor authentication scheme for mobile money: A review of threat models and countermeasures G Ali, M Ally Dida, A Elikana Sam Future Internet 12 (10), 160, 2020 | 69 | 2020 |
Security Perspectives for USSD versus SMS in conducting mobile transactions: A case study of Tanzania B Nyamtiga, A Sam, L Laizer IJTEEE, 2013 | 54 | 2013 |
Enhanced security model for mobile banking systems in Tanzania B Nyamtiga, A Sam, L Laizer IJTEEE, 2013 | 45 | 2013 |
Diabetes forecasting using supervised learning techniques SA Diwani, A Sam Adv Comput Sci an Int J 3, 10-18, 2014 | 42 | 2014 |
A review on healthcare information systems and consensus protocols in blockchain technology C Kombe, M Dida, A Sam International Journal of Advanced Technology and Engineering Exploration 5 …, 2018 | 40 | 2018 |
A secure and efficient multi-factor authentication algorithm for mobile money applications G Ali, MA Dida, A Elikana Sam Future Internet 13 (12), 299, 2021 | 34 | 2021 |
Evaluation of key security issues associated with mobile money systems in Uganda G Ali, M Ally Dida, A Elikana Sam Information 11 (6), 309, 2020 | 34 | 2020 |
Overview applications of data mining in health care: The case study of Arusha region S Diwani, S Mishol, D Kayange, D Machuve, A Sam IJCER, 2013 | 33 | 2013 |
Performance Analysis of Carrier Aggregation for Various Mobile Network Implementations Scenario Based on Spectrum Allocated ASEM Liston Kiwoli International Journal of Wireless & Mobile Networks (IJWMN) 9 (5), 42-53, 2017 | 26* | 2017 |
Blockchain Technology in Sub-Saharan Africa: Where does it fit in Healthcare Systems: A case of Tanzania C Kombe, A Sam, M Ally, A Finne Journal of Health Informatics in Developing Countries 13 (2), 2019 | 21 | 2019 |
Evaluation of Users’ Knowledge and Concerns of Biometric Passport Systems T Habibu, E Luhanga, AE Sam Data 4 (2), 1-17, 2019 | 20 | 2019 |
Assessment of Vulnerabilities of the Biometric Template Protection Mechanism T Habibu, AE Sam International Journal of Advanced Technology and Engineering Exploration …, 2018 | 16 | 2018 |
Heuristic evaluation and usability testing of G-MoMo applications G Ali, M Dida, A Sam IADITI, 2022 | 12 | 2022 |
Performance Comparison of Ensemble Learning and Supervised Algorithms in Classifying Multi-label Network Traffic Flow M Machoke, J Mbelwa, J Agbinya, AE Sam Engineering, Technology & Applied Science Research 12 (3), 8667-8674, 2022 | 11 | 2022 |
A study of users’ compliance and satisfied utilization of biometric application system T Habibu, ET Luhanga, AE Sam Information Security Journal: A Global Perspective 30 (3), 125-138, 2021 | 10 | 2021 |
Early fire detection system in tanzania markets R Hilary, P Rotich, A Geofrey, A Sam Engineering Proceedings 2 (1), 50, 2020 | 10 | 2020 |
An Online Collaborative Discussion Platform for Bridging a Technological Reliance Gap in Higher Learning Institutions in Tanzania L John, AE Sam Modern Education and Computer Science Press, 2018 | 10 | 2018 |
Forward Error Correction Convolutional Codes for RTAs' Networks: An Overview SI Mrutu, A Sam, NH Mvungi International Journal of Computer Network and Information Security 6 (7), 19, 2014 | 10 | 2014 |
Development of innovative secured remote sensor water quality monitoring & management system: case of Pangani water basin K Mwemezi, A Sam Modern Education and Computer Science Press, 2019 | 9 | 2019 |
Safety Zone Determination For Wireless Cellular Tower-A Case Study From Tanzania C Nyakyi, S Mrutu, A Sam, J Anatory IJRET, 2013 | 9 | 2013 |