Improving LTE EPS-AKA using the security request vector.
Cristian-Gabriel ApostolCiprian RacuciuPublished in: ECAI (2015)
Keyphrases
- computer security
- security requirements
- security issues
- access requests
- itemsets
- security measures
- access control
- security protocols
- security systems
- security management
- information security
- network security
- communication systems
- statistical databases
- intrusion detection
- feature vectors
- vector space
- information assurance
- security problems
- key management
- functional requirements
- computer networks