Security protocols for 2G and 3G wireless communications.
Thomas NeweTom CoffeyPublished in: ISICT (2003)
Keyphrases
- security protocols
- wireless communication
- wireless networks
- communication networks
- short range
- key management
- wireless sensor networks
- security properties
- computer simulation
- automated design
- fourth generation
- wireless channels
- wireless transmission
- security mechanisms
- artificial immune algorithm
- cognitive radio
- security requirements
- rfid tags
- access control
- data collection