Qatrunnada Binti Abdul Rahman

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
The dynamicity of ubiquitous application environment where devices are free to connect and disconnect has made it exposed to adversaries. Identity impostor, man-in-the-middle attack and unauthorized access are some of the threats posed by the potential adversaries. These threats exist due to the lack of good authentication protocol for ubiquitous(More)
– The deficient of a good authentication protocol in a ubiquitous application environment has made it a good target for adversaries. As a result, all the devices which are participating in such environment are said to be exposed to attacks such as identity impostor, man-in-the-middle attacks and also unauthorized attacks. Thus, this has created skeptical(More)
  • 1