Login / Signup
User dependent cryptography for security in future mobile telecommunication systems.
Ahmad Sabouri
Nikos Komninos
Christos Douligeris
Published in:
ICT (2011)
Keyphrases
</>
telecommunication systems
information security
malicious code detection
mobile devices
cyber security
mobile phone
user authentication
mobile internet
data mining
network security
encryption algorithms
mobile users
security issues
security requirements
mobile terminals