5G security architecture and light weight security authentication.
Fei PanHong WenHuanhuan SongTang JieLongye WangPublished in: ICCC Workshops (2015)
Keyphrases
- security architecture
- lightweight
- security mechanisms
- security model
- access control
- security policies
- rfid tags
- authentication protocol
- security requirements
- security issues
- resource constrained
- security analysis
- data integrity
- smart card
- wireless sensor networks
- operating system
- simulation platform
- insider threat
- distributed databases
- public key
- information security
- data security
- databases
- resource constraints
- electronic commerce
- cloud computing
- database