Mobile security - in search for comprehensive integrity
Mobile security - in search for comprehensive integrity
- Author(s): P. Eskelinen ; P. Vuorimaa ; M. Tommiska ; I. Niemela ; R. Smeds ; P. Vainikainen ; M. Sipila ; K. Hytonen ; K. Tenhonen ; A. Paloheimo
- DOI: 10.1049/cp:20040716
For access to this article, please select a purchase option:
Buy conference paper PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Thank you
Your recommendation has been sent to your librarian.
- Author(s): P. Eskelinen ; P. Vuorimaa ; M. Tommiska ; I. Niemela ; R. Smeds ; P. Vainikainen ; M. Sipila ; K. Hytonen ; K. Tenhonen ; A. Paloheimo Source: Fifth IEE International Conference on 3G Mobile Communication Technologies (3G 2004) The Premier Technical Conference for 3G and Beyond, 2004 p. 457 – 460
- Conference: Fifth IEE International Conference on 3G Mobile Communication Technologies (3G 2004) The Premier Technical Conference for 3G and Beyond
- DOI: 10.1049/cp:20040716
- ISBN: 0 86341 388 9
- Location: London, UK
- Conference date: 18-20 Oct. 2004
- Format: PDF
Inspec keywords: optical fibre networks; 3G mobile communication; mobile radio; cryptography; telecommunication security; field programmable gate arrays; biometrics (access control); multimedia communication; business communication; 4G mobile communication; electromagnetic coupling; software architecture; optical communication equipment
Subjects: Optical communication equipment; Optical fibre networks; Cryptography; Logic circuits; Data security; Mobile radio systems; Computer communications; Multimedia; Multimedia communications; Logic and switching circuits