Login / Signup

The study on the user authentication protocol in GSM.

Ha-Yong JeonMin-Soo Jung
Published in: ICHIT (2009)
Keyphrases
  • user authentication
  • authentication scheme
  • databases
  • access control