Login / Signup
GSM: Security, Services, and the SIM.
Klaus Vedder
Published in:
State of the Art in Applied Cryptography (1997)
Keyphrases
</>
security services
security protocols
security mechanisms
personal information
key management
rfid tags
end to end
government services
digital images
third party
resource constrained
content providers