Enhancing Security of LTE using a Double Masking Technique.
Jung-Chun LiuYi-Li HuangFang-Yie LeuPublished in: BWCCA (2016)
Keyphrases
- security policies
- intrusion detection
- access control
- security issues
- network security
- quality of service
- human visual system
- computer security
- security problems
- security threats
- information assurance
- information security
- data mining
- security requirements
- rfid tags
- key management
- security level
- security measures
- empirically derived