Login / Signup

Security management against cloned cellular telephones.

Mirela Sechi Moretti Annoni NotareFernando Augosto da Silva CruzBernardo Gonçalves RisoCarlos Becker Westphall
Published in: ICON (1999)
Keyphrases
  • security management
  • security policies
  • multi tier
  • network security
  • security issues
  • cross organizational
  • security measures
  • databases
  • database management
  • relational databases
  • low cost
  • end to end