Comments
www.cal-impac.org/ScienceII/CompSci04_Annual.doc
Posted by crouse
www.blackhat.com/html/bh-usa.../bh-usa-09-speakers.html
Posted by crouse
www.computerweekly.com
Posted by crouse
Authentication prevents fraud(cloning) as we do the authorization and
checks wether it is the real subcriber or a clone, and we give temporary
identities to the subscribers which we change so that if a person wants to
done,we may not do so as the temporary ID will change.
Eves dropping can be prevented by encryptimp the signaling as well
as the information do that no one unauthanticated can use the data.
Subscribers identity can be prevented by seing temporary identity and
using authentication to access the subscribers identity
Posted by Fangzhou