Hae
Aineistot 1-1 / 1
Comparison of the performance of 3G security algorithms in the NAS layer
(2013)
Diplomityö
Diplomityö
Cryptographic functionality implementation approaches have evolved over time, first, for running security software on a general-purpose processor, second, employing a separate security co-processor ,and third, using built-in ...