The article focuses on the mobile advertising campaign of fast-food restaurant chain McDonald's in line with the Money Monopoly competition from Bauer, O2 and Vodafone. The mobile display advertising campaign is age-t...
The company aimed to increase engagement in itsMy McDonald’s Rewardsapp. To do that, the brand employed InMobi to develop a rich-media interstitial ad unit with an in-built game: The game challenged mobile users to earn points by adding McDonald’s items to a takeout bag, after which...
Dawoud, and S. Mcdonald, "Key Distribution in Mobile Ad Hoc Networks based on Message Relaying", In Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS'07), Cambridge, UK, July 2007.Key Distribution in Mobile Ad Hoc Networks based on Message Relaying," ...
Secure routing protocols for mobile ad-hoc wireless networks," in Advanced Wired and Wireless Networks, T. A. Wysocki, A. Dadej, and B. J. Wysocki, Eds. Springer, 2004.A.A. Pirzada, C. McDonald, Secure routing protocols for mobile ad- hoc wireless networks, in: T.A. Wysocki, A....
Dawoud, and S. Mcdonald, "Key Distribution in Mobile Ad Hoc Networks based on Message Relaying", In Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS'07), Cambridge, UK, July 2007.Key Distribution in Mobile Ad Hoc Networks b...
This addresses the major problem in providing key management services for mobile ad hoc networks, without compromising security.doi:10.23919/SAIEE.2006.9488029J Van Der MerweD S DawoudS McdonaldAFRICA RESEARCH JOURNALA public key management scheme and threshold multi-signature scheme for mobile Ad Hoc...
Dawoud, and S. Mcdonald, "Key Distribution in Mobile Ad Hoc Networks based on Message Relaying", In Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS'07), Cambridge, UK, July 2007.Key Distribution in Mobile Ad Hoc Networks based on Message Relaying," ...
McDonald, 2006. "Detecting and evading wormholes in mobile ad-hoc wireless networks," International Journal of Network Security, 3(2): 188-199.A. A. Pirzada and C. McDonald, "Detecting and evading wormholes in mobile ad-hoc wireless networks," Int. Journal of Network Security, vol. 3, ...