Overview of 5G security technology.
Xinsheng JiKaizhi HuangLiang JinHongbo TangCaixia LiuZhou ZhongWei YouXiaoming XuHua ZhaoJiangxing WuMing YiPublished in: Sci. China Inf. Sci. (2018)
Keyphrases
- data encryption
- data processing
- security requirements
- intrusion detection
- technological advances
- access control
- statistical databases
- computer systems
- case study
- information security
- digital rights management
- key technologies
- computer security
- security systems
- security management
- security architecture
- data mining
- security measures
- information processing systems
- sensor technology
- rfid technology
- database
- personal computer
- social networks