H. A. Eneh

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Research works on the analysis and the development of authentication protocols frequently adopt the linear software development approach and are based on certain non-extensible assumptions (Tobler and Hutchison 2004), (Grob 2003), (Harbitter and Menasce 2002). This paper is part of an ongoing work regarding the development of a pre-emptive security(More)
  • 1