Security Requirements and Challenges of 6G Technologies and Applications.
Shimaa A. Abdel HakeemHanan H. HusseinHyungWon KimPublished in: Sensors (2022)
Keyphrases
- security requirements
- security concerns
- security problems
- smart card
- security analysis
- information security
- security policies
- security model
- security properties
- software architecture
- access control
- security mechanisms
- secure electronic
- security patterns
- reference models
- data mining
- mobile commerce
- real world
- databases
- requirements engineering
- security issues
- network technologies
- autonomous agents
- electronic commerce
- object oriented
- covert channel