Next Article in Journal
Solving the Schrödinger Equation with Genetic Algorithms: A Practical Approach
Previous Article in Journal
Understanding Bitcoin Price Prediction Trends under Various Hyperparameter Configurations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Correction

Correction: Mohammad et al. User Authentication and Authorization Framework in IoT Protocols. Computers 2022, 11, 147

1
Faculty of IT-Department of CS, Philadelphia University, Amman P.O. Box 1, Jordan
2
Faculty of IT-Department of Information Security and Cybersecurity, Philadelphia University, Amman P.O. Box 1, Jordan
3
Faculty of IT-Department of MIS, Philadelphia University, Amman P.O. Box 1, Jordan
*
Author to whom correspondence should be addressed.
Submission received: 27 October 2022 / Accepted: 8 November 2022 / Published: 23 November 2022
The authors wish to make corrections to change the authorship [1], and the affiliation information should also be updated.
In the published paper, the authors’ names are: Hasan Al-Refai 1 and Ali Ahmad Alawneh 2,*.
The correct authorship should be: Ammar Mohammad 1, Hasan Al-Refai 2 and Ali Ahmad Alawneh 3,*.
In the published paper, the affiliations are:
  • Faculty of IT-Department of CSIS, Philadelphia University, Amman P.O. Box 1, Jordan
  • Faculty of IT-Department of MIS, Philadelphia University, Amman P.O. Box 1, Jordan
The correct affiliations are:
  • Faculty of IT-Department of CS, Philadelphia University, Amman P.O. Box 1, Jordan
  • Faculty of IT-Department of Information Security and Cybersecurity, Philadelphia University, Amman P.O. Box 1, Jordan
  • Faculty of IT-Department of MIS, Philadelphia University, Amman P.O. Box 1, Jordan
The correct Author Contributions are:
  • Author Contributions: Data curation, A.A.A.; Formal analysis, H.A.-R.; Methodology, H.A.-R.; Software, A.A.A. and A.M.; Validation, H.A.-R. and A.M. All authors have read and agreed to the published version of the manuscript.
The authors apologize for any inconvenience caused and state that the scientific conclusions are unaffected. This correction was approved by the Academic Editor. The original publication has also been updated.

Reference

  1. Mohammad, A.; Al-Refai, H.; Alawneh, A.A. User Authentication and Authorization Framework in IoT Protocols. Computers 2022, 11, 147. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Mohammad, A.; Al-Refai, H.; Alawneh, A.A. Correction: Mohammad et al. User Authentication and Authorization Framework in IoT Protocols. Computers 2022, 11, 147. Computers 2022, 11, 168. https://0-doi-org.brum.beds.ac.uk/10.3390/computers11120168

AMA Style

Mohammad A, Al-Refai H, Alawneh AA. Correction: Mohammad et al. User Authentication and Authorization Framework in IoT Protocols. Computers 2022, 11, 147. Computers. 2022; 11(12):168. https://0-doi-org.brum.beds.ac.uk/10.3390/computers11120168

Chicago/Turabian Style

Mohammad, Ammar, Hasan Al-Refai, and Ali Ahmad Alawneh. 2022. "Correction: Mohammad et al. User Authentication and Authorization Framework in IoT Protocols. Computers 2022, 11, 147" Computers 11, no. 12: 168. https://0-doi-org.brum.beds.ac.uk/10.3390/computers11120168

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop