|
Volumn 3, Issue , 1999, Pages 1969-1973
|
Security management against cloning mobile phones
a a a a a |
Author keywords
[No Author keywords available]
|
Indexed keywords
CELLULAR TELEPHONE SYSTEMS;
COMPUTER ARCHITECTURE;
DISTRIBUTED COMPUTER SYSTEMS;
INFORMATION MANAGEMENT;
PATTERN RECOGNITION SYSTEMS;
SECURITY OF DATA;
CLONED MOBILE PHONES;
COMMON OBJECT REQUEST BROKER ARCHITECTURE (CORBA);
DISTRIBUTED MANAGEMENT;
SECURITY MANAGEMENT;
TELECOMMUNICATION NETWORKS;
|
EID: 0033293431
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: None Document Type: Conference Paper |
Times cited : (4)
|
References (15)
|