Security of Micro MEC in 6G: A Brief Overview.
Ijaz AhmadSergio LemboFelipe RodriguezStephan MehnertMikko VehkaperäPublished in: CCNC (2022)
Keyphrases
- information security
- information assurance
- security policies
- network security
- statistical databases
- security issues
- security measures
- security systems
- computer security
- security vulnerabilities
- access control
- security analysis
- security protocols
- cyber security
- mobile devices
- cyber attacks
- key management
- functional requirements
- data encryption