共 50 条
- [1] Distributed Security Architecture for Authentication in 4G Networks [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER APPLICATIONS (ICACA), 2016, : 286 - 291
- [2] Mobile Security and Trusted Computing [J]. IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 321 - 326
- [3] A Novel Mobile Edge Computing-based Architecture for Future Cellular Vehicular Networks [J]. 2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
- [5] 4G mobile network architecture [J]. EMERGING PERSONAL WIRELESS COMMUNICATIONS, 2001, 67 : 183 - 195
- [6] An Efficient Security Architecture for Trusted Computing [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 599 - 601
- [7] DESIGN AND IMPLEMENTATION OF TRUSTED COMPUTING-BASED MUTUAL AUTHENTICATION MODEL FOR MOBILE TERMINAL [J]. 2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 3: COMPUTER-AIDED DESIGN, MANUFACTURING AND MANAGEMENT, 2011, : 309 - 313
- [8] Mobile Networks Beyond 4G [J]. WORLD CONGRESS ON ENGINEERING, WCE 2015, VOL I, 2015, : 649 - 652
- [9] Spoofed Networks: Exploitation of GNSS Security Vulnerability in 4G and 5G Mobile Networks [J]. 2021 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (SPECTS), 2021,
- [10] Based on Trusted Computing Solutions for Mobile Payment Terminal Security [J]. NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 570 - 574