Login / Signup
How voice call technology poses security threats in 4G LTE networks.
Guan-Hua Tu
Chi-Yu Li
Chunyi Peng
Songwu Lu
Published in:
CNS (2015)
Keyphrases
</>
security threats
security issues
key management
case study
cost effective
computer networks
wireless sensor networks
response time
low cost
data processing
privacy preserving
security risks