Articles with "overview security" as a keyword



Photo from archive.org

Overview of 5G security technology

Sign Up to like & get
recommendations!
Published in 2017 at "Science China Information Sciences"

DOI: 10.1007/s11432-017-9426-4

Abstract: The 5th-generation mobile communication system (5G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5G security technology. This paper analyzes the security requirements of… read more here.

Keywords: security technology; technology; overview security; security ... See more keywords
Photo from wikipedia

An Overview of Security Materials in Banknotes and Analytical Techniques in Detecting Counterfeits.

Sign Up to like & get
recommendations!
Published in 2023 at "Critical reviews in analytical chemistry"

DOI: 10.1080/10408347.2023.2209185

Abstract: Counterfeiting or forged imitation of banknotes is a perpetual practice engulfing global economies. This not only poses challenges for the material scientists to come forth with advanced security materials but also demands veracious forensic examination… read more here.

Keywords: analytical techniques; spectroscopy; overview security; security ... See more keywords
Photo by jordanharrison from unsplash

An Overview of Security Support in Named Data Networking

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Communications Magazine"

DOI: 10.1109/mcom.2018.1701147

Abstract: This article presents an overview of the security mechanisms in the NDN architecture that have been developed over the past several years. NDN changes the network communication model from the delivery of packets to hosts… read more here.

Keywords: security support; named data; overview security; security ... See more keywords