Analysis of confidentiality algorithms in different mobile generations

In past years, a variety of Mobile technology generations have been adopted in mobile communication systems. Various sensitive information (e.g. emails, bank transactions, voice calls, ... ) was exchanged via the mobile systems. The protection of information...

Full description

Bibliographic Details
Main Authors: Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha
Format: Conference or Workshop Item
Language:English
Published: 2017
Subjects:
Online Access:http://irep.iium.edu.my/61226/
http://irep.iium.edu.my/61226/
http://irep.iium.edu.my/61226/
http://irep.iium.edu.my/61226/1/61226_Analysis%20of%20Confidentiality%20Algorithms.pdf