Sign in

Analyzing the security techniques used in LTE Advanced and their evaluation.

Iftikhar RasheedAsjad AminMahwish ChaudharySadaf BukhariMuhammad RizwanKashif Ali
Published in: ICDIM (2013)
Keyphrases
  • quality of service
  • intrusion detection
  • access control
  • network security
  • security policies
  • security management
  • database
  • data mining
  • evaluation criteria
  • computer security
  • security protocols
  • security systems