Research Article

An Efficient Security System for Mobile Data Monitoring

Table 2


Server identify (hash with ip and port)TTL threshold