Survey on UAANET routing protocols and network security challenges

JA Maxa, MSB Mahmoud, N Larrieu - Ad Hoc & Sensor Wireless …, 2017 - enac.hal.science
UAV Ad hoc Networks (UAANETs) is a subset of the well-known mobile ad hoc network
(MANET) paradigm. It refers to the deployment of a swarm of small Unmanned Aerial …

[PDF][PDF] Opportunities and challenges of M-commerce adoption in Bangladesh: An empirical study

MM Rahman, T Sloan - Journal of Internet Banking and Commerce, 2015 - academia.edu
The objective of this research is to explore the opportunities and challenges of mcommerce
adoption in Bangladesh. An empirical study is conducted to see the user's perception on this …

[PDF][PDF] A review of fair exchange protocols

A AlOtaibi, H Aldabbas - International Journal of Computer …, 2012 - researchgate.net
Recently, the Internet has become an essential business platform, aiding trading, distribution
and sales between organisations, consumers and even between consumers themselves …

[PDF][PDF] Review on the security related issues in context aware system

S Almutairi, H Aldabbas… - International Journal of …, 2012 - researchgate.net
ABSTRACT A context aware system is recognized as a “system which uses any context
information previous to, or in the duration of, service stipulations”, whereas the main goal of …

A hybrid intrusion detection system for mobile adhoc networks using FBID protocol

D Rajalakshmi, K Meena - Scalable Computing: Practice and Experience, 2020 - scpe.org
The security in a mobile ad hoc networks is more vulnerable and susceptible to the
environment, because in this network no centralized environment for monitoring individual …

[PDF][PDF] Adopting user-centred development for Arabic e-commerce websites

A Alghamdi, H Aldabbas, M Alshehri… - International Journal of …, 2012 - researchgate.net
Over the past few years the Internet has become an essential business platform by aiding
trading, distribution and sales between organisations, consumers, and even between …

An improved distance-based scheme for broadcast storm suppression in VANETs

PH Lee, TC Huang - 2014 9th IEEE International Conference …, 2014 - ieeexplore.ieee.org
Broadcasting is a common operation for disseminating traffic-related information in vehicular
ad hoc networks. However, broadcasting in wireless networks can easily cause the …

Reputation based Symmetric Key Authentication for Secure Data Transmission in Mobile Ad Hoc Networks

S Sangeetha, S Sathappan - EAI Endorsed Transactions on Scalable …, 2023 - eudl.eu
INTRODUCTION: MANETs were a group of nodes which connected each other to establish
the network via wireless association to forward packets towards destinations. OBJECTIVES …

[图书][B] Flexible Network Architectures Security: Principles and Issues

B Rudra - 2018 - taylorfrancis.com
The future of Internet security doesn't lie in doing more of the same. It requires not only a
new architecture, but the means of securing that architecture. Two trends have come …

Resource Allocation and Privacy for Next-Generation Wireless Ad Hoc Networks

F Yang - 2024 - search.proquest.com
Efficient resource utilization and privacy assurance are essential for enabling secure and
high-performance ad hoc network deployments for both military and civilian applications …