Qatrunnada Binti Abdul Rahman

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
– The deficient of a good authentication protocol in a ubiquitous application environment has made it a good target for adversaries. As a result, all the devices which are participating in such environment are said to be exposed to attacks such as identity impostor, man-in-the-middle attacks and also unauthorized attacks. Thus, this has created skeptical(More)
  • 1