Opportunistic networks: mobility models, protocols, security, and privacy
Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.
| Other Authors: | Ahmad, Khaleel |
|---|---|
| Format: | Book |
| Language: | English English |
| Published: |
Taylor and Francis
2019
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/78608/ http://psasir.upm.edu.my/id/eprint/78608/1/Opportunistic%20networks%20COVER.pdf http://psasir.upm.edu.my/id/eprint/78608/2/Opportunistic%20networks.pdf |
Similar Items
Efficient location privacy-aware forwarding in opportunistic mobile networks
by: Zakhary, Sameh, et al.
Published: (2014)
by: Zakhary, Sameh, et al.
Published: (2014)
Reputation aware obfuscation for mobile opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2015)
by: Radenkovic, Milena, et al.
Published: (2015)
Impact of mobility models on social structure formation in opportunistic networks
by: Halikul, Lenando, et al.
Published: (2013)
by: Halikul, Lenando, et al.
Published: (2013)
Neighbor Selection Protocol for Heterogeneous Information Dissemination in Opportunistic Networks
by: Halikul, Lenando, et al.
Published: (2015)
by: Halikul, Lenando, et al.
Published: (2015)
On computing the reliability of opportunistic multihop networks with Mobile relays
by: Khanna, G., et al.
Published: (2019)
by: Khanna, G., et al.
Published: (2019)
Multilayer content services in heterogeneous mobile opportunistic networks
by: Huynh, Vu San Ha
Published: (2021)
by: Huynh, Vu San Ha
Published: (2021)
Forming a Social structure in mobile opportunistic networks
by: Halikul, Lenando, et al.
Published: (2012)
by: Halikul, Lenando, et al.
Published: (2012)
Secure e-transactions protocol using intelligent mobile agents with fair privacy
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Smart energy in opportunistic networks
by: Lamont, Robert
Published: (2017)
by: Lamont, Robert
Published: (2017)
AdaptAnon: adaptive anonymity for service queries in mobile opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2013)
by: Radenkovic, Milena, et al.
Published: (2013)
Collaborative cognitive content dissemination and query in heterogeneous mobile opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2017)
by: Radenkovic, Milena, et al.
Published: (2017)
A TDMA-based cooperative MAC protocol for cognitive networks with opportunistic energy harvesting
by: Sami, Mahmoud, et al.
Published: (2016)
by: Sami, Mahmoud, et al.
Published: (2016)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Towards low cost prototyping of mobile opportunistic disconnection tolerant networks and systems
by: Radenkovic, Milena, et al.
Published: (2016)
by: Radenkovic, Milena, et al.
Published: (2016)
Neighbour selection protocol for information dissemination through P2P interactions in opportunistic network
by: Abdalla Hassan, Gharib
Published: (2013)
by: Abdalla Hassan, Gharib
Published: (2013)
Opportunistic cognitive radio network with primary user activity model
by: Mohamad, Mas Haslinda
Published: (2019)
by: Mohamad, Mas Haslinda
Published: (2019)
The Dynamic Host Configuration Protocol Version 6 Security And Privacy Mechanism
by: Ibrahim, Ayman Khallel
Published: (2020)
by: Ibrahim, Ayman Khallel
Published: (2020)
Integrated Security And Privacy Preservation Approach In Mobile Crowd Sensing
by: Pius, Owoh Nsikak
Published: (2020)
by: Pius, Owoh Nsikak
Published: (2020)
Understanding complementary multi-layer collaborative heuristics for adaptive caching in heterogeneous mobile opportunistic networks
by: Huynh, Vu San Ha, et al.
Published: (2018)
by: Huynh, Vu San Ha, et al.
Published: (2018)
Understanding complementary multi-layer collaborative heuristics for adaptive caching in heterogeneous mobile opportunistic networks
by: Huynh, Vu San Ha, et al.
Published: (2018)
by: Huynh, Vu San Ha, et al.
Published: (2018)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Opportunistic contention-based feedback protocol for downlink OFDMA systems with mixed traffic
by: Patachaianand, Rachod, et al.
Published: (2009)
by: Patachaianand, Rachod, et al.
Published: (2009)
Code location based forwarding technique in opportunistic network
by: Halikul, Lenando, et al.
Published: (2014)
by: Halikul, Lenando, et al.
Published: (2014)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
by: Abiodun, Balogun Kamoru
Published: (2021)
by: Abiodun, Balogun Kamoru
Published: (2021)
Totally opportunistic routing algorithm for underwater wireless sensor network
by: Rahman, Ziaur
Published: (2019)
by: Rahman, Ziaur
Published: (2019)
Congestion aware forwarding in delay tolerant and social opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2011)
by: Radenkovic, Milena, et al.
Published: (2011)
Protocols for secure routing and transmission in mobile ad hoc network: a review
by: Mahdi Ahmed, Salwa Aqeel, et al.
Published: (2013)
by: Mahdi Ahmed, Salwa Aqeel, et al.
Published: (2013)
Candida, the opportunistic human pathogen
by: Sakina, Shahabudin, et al.
Published: (2020)
by: Sakina, Shahabudin, et al.
Published: (2020)
Privacy Model For Transaction Management In Mobile Databases
by: Byamba, Byambasuren
Published: (2010)
by: Byamba, Byambasuren
Published: (2010)
Privacy threat analysis of mobile social network data publishing
by: Abawajy, Jemal H., et al.
Published: (2018)
by: Abawajy, Jemal H., et al.
Published: (2018)
Privacy risk metrics and visualization for mobile social networks (MSNs)
by: Ahmed, Asmau Goggo
Published: (2018)
by: Ahmed, Asmau Goggo
Published: (2018)
Totally Opportunistic Routing Algorithm (TORA) for underwater wireless sensor network
by: Rahman, Ziaur, et al.
Published: (2018)
by: Rahman, Ziaur, et al.
Published: (2018)
Towards social media as a data source for opportunistic sensor networking
by: Meneghello, J., et al.
Published: (2014)
by: Meneghello, J., et al.
Published: (2014)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
An investigation into privacy and security in online social networking sites among IIUM students
by: Abdullahi, Husein Osman, et al.
Published: (2012)
by: Abdullahi, Husein Osman, et al.
Published: (2012)
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018)
by: Rauf, Abdul, et al.
Published: (2018)
Legal Implications On Privacy And Security Issues On The Internet
by: Veloo, Veni
Published: (2002)
by: Veloo, Veni
Published: (2002)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Meeting scheduler with secured privacy web application
by: Lok, Samantha Tian Wen
Published: (2023)
by: Lok, Samantha Tian Wen
Published: (2023)
Similar Items
-
Efficient location privacy-aware forwarding in opportunistic mobile networks
by: Zakhary, Sameh, et al.
Published: (2014) -
Reputation aware obfuscation for mobile opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2015) -
Impact of mobility models on social structure formation in opportunistic networks
by: Halikul, Lenando, et al.
Published: (2013) -
Neighbor Selection Protocol for Heterogeneous Information Dissemination in Opportunistic Networks
by: Halikul, Lenando, et al.
Published: (2015) -
On computing the reliability of opportunistic multihop networks with Mobile relays
by: Khanna, G., et al.
Published: (2019)