The Value of Hardware-Based Security Solutions and its Architecture for Security Demanding Wireless Services.
Rongzhen YangLiang HeShoufeng YangForni GaryFei LiuJiayue ChangManxue GuoPublished in: Security and Management (2006)
Keyphrases
- network access
- network services
- real time
- security requirements
- access control
- wireless networks
- information security
- network security
- security issues
- inter domain
- security services
- highly distributed
- security architecture
- voice and data services
- communication protocols
- web services
- enterprise network
- directory service
- service management
- ubiquitous computing environments
- key management
- security policies
- network infrastructure
- application level
- security protocols
- loosely coupled
- mobile networks
- intrusion detection
- peer to peer
- protection schemes
- sensor networks