Analysis of confidentiality algorithms in different mobile generations

In past years, a variety of Mobile technology generations have been adopted in mobile communication systems. Various sensitive information (e.g. emails, bank transactions, voice calls, ... ) was exchanged via the mobile systems. The protection of information...

Full description

Saved in:
Bibliographic Details
Main Authors: Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha
Format: Conference or Workshop Item
Language:English
Published: 2017
Subjects:
Online Access:http://irep.iium.edu.my/61226/1/61226_Analysis%20of%20Confidentiality%20Algorithms.pdf
http://irep.iium.edu.my/61226/
http://cic.cihanuniversity.edu.iq/wp-content/uploads/2017/04/10.24086cocos17.09.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!