Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Cryptanalysis and enhancements of delegation-based authentication protocol for secure roaming service
Yichen Wang; Qiong Pu; Shuhua Wu
International Journal of Electronic Security and Digital Forensics (IJESDF), 2012 Vol.4 No.4, pp.252 - 260
8 + 1 =

Thank you for your feedback.