Trusted Computing-Based Security Architecture For 4G Mobile Networks.
Yu ZhengDake HeWeichi YuXiaohu TangPublished in: PDCAT (2005)
Keyphrases
- mobile networks
- trusted computing
- security architecture
- access control
- access control policies
- security policies
- mobile users
- computing environments
- security model
- computing platform
- mobile devices
- cloud computing
- wireless networks
- ad hoc networks
- base station
- intrusion detection system
- multimedia content
- security mechanisms
- databases
- multi agent
- multi agent systems
- public key
- security requirements
- parallel computing
- low cost
- routing problem
- data mining techniques
- distributed computing
- routing algorithm