Login / Signup

GSM: Security, Services, and the SIM.

Klaus Vedder
Published in: State of the Art in Applied Cryptography (1997)
Keyphrases
  • security services
  • security protocols
  • security mechanisms
  • personal information
  • key management
  • rfid tags
  • end to end
  • government services
  • digital images
  • third party
  • resource constrained
  • content providers