Across
- 3. sensitive informationon hard drives are destroyed
- 6. The network element that can interconnect two gsm network.
- 7. application protocol Push which is basically and specially used to encoded message which includes a link to a WAP addreSS
- 8. anonymity Designed to protect the user against someone
Down
- 1. system for mobile communication which allows users to roam seamlessly between network and separate the user identify from phone equipment
- 2. Feasibility of USIM component tested using
- 4. Enhanced authentication protocol for 3G security
- 5. station controller which allow all control function and physical link between MCS and BTS
