Login / Signup

How voice call technology poses security threats in 4G LTE networks.

Guan-Hua TuChi-Yu LiChunyi PengSongwu Lu
Published in: CNS (2015)
Keyphrases
  • security threats
  • security issues
  • key management
  • case study
  • cost effective
  • computer networks
  • wireless sensor networks
  • response time
  • low cost
  • data processing
  • privacy preserving
  • security risks