Login / Signup
Security Evaluation of CDMA2000.
Levent Ertaul
Shalaja Natte
Gökay Saldamli
Published in:
ICWN (2010)
Keyphrases
</>
evaluation method
information security
data sets
evaluation methods
functional requirements
database
information systems
evaluation criteria
computer security