Login / Signup
Transparent Third-Party Authentication With Application Mobility for 5G Mobile-Edge Computing.
Asad Ali
Ying-Dar Lin
Chi-Yu Li
Yuan-Cheng Lai
Published in:
IEEE Trans. Netw. Serv. Manag. (2024)
Keyphrases
</>
third party
mobility patterns
mobile devices
mobile phone
personal information
visual basic
mobile computing
sensitive information
mobile networks
mashup
trusted third party