ItemConference Paper

An analysis on direct authentication of data