Learn More
Mutual authentication is vital concept to network security and incorporated to proprietary security solutions. In this paper, we present a new mutual authentication protocol based on graph isomorphism that can stop man-in-the-middle, session high-jacking and replay attacks. Although authentication protocol based on graph isomorphism was motivated by WLAN(More)
Graph isomorphism has received considerable attention because of many of the practical applications of the problem. Also, researchers have not yet been able to discover where the graph isomorphism problem fits into the NP complexity model. In this paper, we establish necessary conditions for graph isomorphism problem. Based on these conditions, algorithms(More)
BACKGROUND Limited data are available on HIV viral suppression rates among men and women on antiretroviral therapy (ART) and factors associated with HIV RNA viral load (VL) suppression in Vietnam. METHODS We conducted a cross-sectional survey of 1255 adult patients on ART for at least 1 year across four provinces in Vietnam. Data collection included a(More)
  • 1