Return to Article Details An efficient token based authentication mechanism for IP trace back Download Download PDF