zip

Independent security management system in mobile networks

  • 2013-09-22
  • 244.56KB
  • Points it Requires : 2

  This paper proposes a security management system for mobile networks. Since the access network can independently authenticate roaming users, the system is called Independent Security Management (ISM). Based on ISM, a roaming user authentication protocol is designed. Through comparative analysis of the protocols, it can be seen that compared with other security management systems, the outstanding advantages of ISM are clear division of security responsibilities and high authentication efficiency.

unfold

You Might Like

Uploader
flexbuilder
 

Recommended ContentMore

Popular Components

Just Take a LookMore

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews


Room 1530, 15th Floor, Building B, No.18 Zhongguancun Street, Haidian District, Beijing, Postal Code: 100190 China Telephone: 008610 8235 0740

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号
×