A Nabih, A Hossain, S Shepherd, M Khaled - 7th European Conference on …, 2008 - zu.edu.jo
Wider use of on-line transactions has enabled internet identity thieves and computer hackerssomeone who breaks computer and network security-to carry out their work …
An exchange protocol describes a sequence of steps by which several entities are capable of exchanging certain pieces of information in a particular context. Rational {exchange …