Description: The article in accordance with the characteristics of WiMAX, a detailed analysis of the 802.16d and 802.16e common security policy, information on the IMS Application of WiMAX, especially VoIP security issues, and described in WiMAX end-to-end security strategy, and finally pointed out that the current there is insufficient security strategy direction and improving.
File list (Check if you may need any files):
WiMAX_SECUERITY.doc