A. H. Wadaa

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Networking has brought about the potential of distributed applications to the user. Typically in such applications there are several different interacting processes that run in multiple hosts and communicate across the network for exchanging data and exercising control. Authentication is an intrinsic activity in the context of distributed applications. A(More)
  • 1