Sciweavers

62 search results - page 13 / 13
» Efficient remote mutual authentication and key agreement
Sort
View
PDCAT
2005
Springer
14 years 4 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
AICT
2010
IEEE
240views Communications» more  AICT 2010»
13 years 2 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...