Comparative study on 4G/LTE cryptographic algorithms based on different factors

Recently, (LTE) Long Term Evolution appeared as a robust technology to meet (4G) Fourth Generation cellular networks requirements. Apparently, there are three sets of cryptographic algorithms that work on LTE technology and each set based on core algorithm. Therefore, in this paper we are focusing o...

Full description

Saved in:
Bibliographic Details
Main Authors: Ghanim, Alyaa, Alshaikhli, Imad Fakhri Taha
Format: Article
Language:en
Published: IJCST 2014
Subjects:
Online Access:http://irep.iium.edu.my/37424/1/ijcst-14.pdf
http://irep.iium.edu.my/37424/
http://www.ijcst.org/Volume5/Issue7/p2_5_7.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!