Abstract
This contribution discusses algorithms for strong authentication of applications in mobile devices. The current LTE and IMS networks provide strong au......
小提示:本篇文献需要登录阅读全文,点击跳转登录