An Approach for End-to-End (E2E) Security of 5G Applications

K. Anitha Kumari, G. Sudha Sadasivam, S. Shymala Gowri, Sebastin Arockia Akash, E. G. Radhika. An Approach for End-to-End (E2E) Security of 5G Applications. In 4th IEEE International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2018, Omaha, NE, USA, May 3-5, 2018. pages 133-138, IEEE, 2018. [doi]

Authors

K. Anitha Kumari

This author has not been identified. Look up 'K. Anitha Kumari' in Google

G. Sudha Sadasivam

This author has not been identified. Look up 'G. Sudha Sadasivam' in Google

S. Shymala Gowri

This author has not been identified. Look up 'S. Shymala Gowri' in Google

Sebastin Arockia Akash

This author has not been identified. Look up 'Sebastin Arockia Akash' in Google

E. G. Radhika

This author has not been identified. Look up 'E. G. Radhika' in Google