3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model.
Muhammad SherThomas MagedanzPublished in: ARES (2007)
Keyphrases
- security model
- access control
- security requirements
- public key
- buffer overflow
- security analysis
- security risks
- security architecture
- security mechanisms
- security vulnerabilities
- security problems
- wireless networks
- provably secure
- watermarking scheme
- smart card
- security protocols
- quality of service
- cryptographic protocols
- public key cryptography
- authentication and key agreement