Introduction
Normally we want security of two kind.
Security inside the System i.e. S...rents have access to the box of money, the children have full...kept aside, guest have access of guestroom, mother have full acce...
The phone generally has different kind of data, and depe...So Mobile companies like Nokia, Motorola and server developers like IBM Openwave have c..., fragmentation, authentication .etc.
Protocol stack can be represented in two picture...