Login / Signup
Analyzing the security techniques used in LTE Advanced and their evaluation.
Iftikhar Rasheed
Asjad Amin
Mahwish Chaudhary
Sadaf Bukhari
Muhammad Rizwan
Kashif Ali
Published in:
ICDIM (2013)
Keyphrases
</>
quality of service
intrusion detection
access control
network security
security policies
security management
database
data mining
evaluation criteria
computer security
security protocols
security systems