Qatrunnada Binti Abdul Rahman

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
The deficient of a good authentication protocol in a ubiquitous application environment has made it a good target for adversaries. As a result, all the devices which are participating in such environment are said to be exposed to attacks such as identity impostor, man-in-the-middle attacks and also unauthorized attacks. Thus, this has created skeptical(More)
  • 1