Login / Signup
Authentication and Encryption in GSM and 3GUMTS: An Emphasis on Protocols and Algorithms
Ali Elouafiq
Published in:
CoRR (2012)
Keyphrases
</>
significant improvement
computationally efficient
theoretical analysis
data structure
computational cost
computational complexity
end to end
identity authentication