Login / Signup
Security management against cloned cellular telephones.
Mirela Sechi Moretti Annoni Notare
Fernando Augosto da Silva Cruz
Bernardo Gonçalves Riso
Carlos Becker Westphall
Published in:
ICON (1999)
Keyphrases
</>
security management
security policies
multi tier
network security
security issues
cross organizational
security measures
databases
database management
relational databases
low cost
end to end