Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Hasan Al Refai"'
Publikováno v:
Computers, Vol 12, Iss 6, p 125 (2023)
Neighbor Discovery Protocol (NDP) is a network protocol used in IPv6 networks to manage communication between neighboring devices. NDP is responsible for mapping IPv6 addresses to MAC addresses and discovering the availability of neighboring devices
Externí odkaz:
https://doaj.org/article/12eca0f831b04c0695a66ab147282586
Publikováno v:
Computers, Vol 11, Iss 12, p 168 (2022)
The authors wish to make corrections to change the authorship [...]
Externí odkaz:
https://doaj.org/article/a99781e6a99b436bade0d39afdacfe86
Publikováno v:
Computers, Vol 11, Iss 10, p 147 (2022)
The Internet of Things (IoT) has become one of the most attractive domains nowadays. It works by creating a special network between physical devices such as vehicles, home equipment, and other items. In recent days, the common technologies of communi
Externí odkaz:
https://doaj.org/article/8dc7e3573348492ba98c2884308131fe
Autor:
Hasan Al-refai, Ali Alawneh
The Internet of Things (IoT) has become one of the most attractive domains nowadays. It works by creating a special network between physical devices such as vehicles, home equipment, and other items. In recent days, the common technologies of communi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::48b73dcbb861acde986039c668e7706e
Autor:
Hasan Al-Refai
Publikováno v:
International Journal of Wireless & Mobile Networks. 12:13-28
Wireless Sensor Networks (WSN) have extensively deployed in a wide range of applications. However, WSN still faces several limitations in processing capabilities, memory, and power supply of sensor nodes. It is required to extend the lifetime of WSN.
Recently, there are several studies have proposed user authentication frameworks to defend against different types of attacks such as phishing, replay attack, man in the middle attack and denial of service attack, etc. Most of these frameworks consis
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cb8f080c7a8cb89baceec1c2bf2dcd6f
Publikováno v:
International Journal of Software Engineering & Applications. 8:01-12
Object-Z is an object-oriented specification language which extends the Z language with classes, objects, inheritance and polymorphism that can be used to represent the specification of a complex system as collections of objects. There are a number o
Publikováno v:
International Journal of Wireless & Mobile Networks. 6:61-67
Sensor networks consist of a large number of small, low-powered wireless nodes with limited computation, communication, and sensing abilities, in a battery-powered sensor network, energy and communication bandwidth are a precious resources. Thus, the
Publikováno v:
Government Information Quarterly. 30:277-288
User satisfaction is a crucial factor for continual usage of e-Government services and for the success or failure of e-Government projects. The main challenge for Jordanians is what are the key determinants of their satisfaction? This paper aims to i
Autor:
Khaldoun Batiha, Hasan Al-Refai
Publikováno v:
Journal of Advanced Computer Science & Technology. 6:13
Lots of work have been attempted to enhance the SET protocol performance special attention is on E-payment phase. This paper thoroughly analyzes recent works on payment phase; it has been found that this subject requires considerable enhancements, si