Return to Article Details Authentication Comparison of Telecommunications Technology Using A3, A8, A5 and Rijndael Algorithms Download Download PDF