Return to Article Details Authentication and preference mapping of ham Download Download PDF