Network Evolution in 3G/4G: Applications and Security Issues

During the 20th century, the key technology was information gathering, processing and distribution. This total technology will depend based on the network systems. Which are nothing but grouping of systems that should be controlled by a server. In business and home applications, mobile users, and in all social issues the networks are used. To enhance the benefits of these networks, the authors are introducing 3G systems. The aim of the 3G security architecture is to improve on the security of 2G systems.3G systems have additional standards like EDGE and CDMA rather than older systems.

Provided by: International Journal of Computer Science and Information Technologies Topic: Security Date Added: Dec 2011 Format: PDF

Find By Topic