Login / Signup

Transparent Third-Party Authentication With Application Mobility for 5G Mobile-Edge Computing.

Asad AliYing-Dar LinChi-Yu LiYuan-Cheng Lai
Published in: IEEE Trans. Netw. Serv. Manag. (2024)
Keyphrases
  • third party
  • mobility patterns
  • mobile devices
  • mobile phone
  • personal information
  • visual basic
  • mobile computing
  • sensitive information
  • mobile networks
  • mashup
  • trusted third party