Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System
暂无分享,去创建一个
Jheng-Jia Huang | Chun-I Fan | Yu-Tse Shih | Wan-Ru Chiu | Chun-I Fan | Jheng-Jia Huang | Yu-Tse Shih | Wan-Ru Chiu
[1] Noel Crespi,et al. Authentication and Access Control for 5G , 2020 .
[2] Alfred Menezes,et al. The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..
[3] Wei-Tsung Su,et al. A survey of performance improvement by group-based authentication in IoT , 2016, 2016 International Conference on Applied System Innovation (ICASI).
[4] Victor Shoup,et al. A Proposal for an ISO Standard for Public Key Encryption , 2001, IACR Cryptol. ePrint Arch..
[5] M. Scott. Implementing cryptographic pairings , 2007 .
[6] Shanay Behrad. Slice specific authentication and access control for 5G. (Authentification et contrôle d'accès spécifique aux slices pour 5G) , 2020 .
[7] Jianhong Zhou,et al. A Hybrid Authentication Protocol for LTE/LTE-A Network , 2019, IEEE Access.
[8] Noël Crespi,et al. Network Access Control for the IoT: A Comparison Between Cellular, Wi-Fi and LoRaWAN , 2019, 2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN).
[9] Günther Horn,et al. Towards 5G Security , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[10] Yuguang Fang,et al. Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.
[11] Keith M. Martin,et al. On the Efficacy of New Privacy Attacks against 5G AKA , 2019, ICETE.
[12] Xuemin Shen,et al. SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks , 2013, Comput. Networks.
[13] Jin Cao,et al. PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks , 2019, Ad Hoc Networks.
[14] Roger Piqueras Jover,et al. The current state of affairs in 5G security and the main remaining security challenges , 2019, ArXiv.
[15] Xiaodong Lin,et al. Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT , 2018, IEEE Journal on Selected Areas in Communications.
[17] Security challenges and opportunities for 5 G mobile networks , 2017 .
[18] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[19] Sudipta Chattopadhyay,et al. An improved authentication and security scheme for LTE/LTE-A networks , 2020, J. Ambient Intell. Humaniz. Comput..
[20] Ralf Sasse,et al. A Formal Analysis of 5G Authentication , 2018, CCS.
[21] Rosario Giustolisi,et al. Threats to 5G Group-based Authentication , 2016, SECRYPT.
[22] Sihem Mesnager,et al. A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems , 2016, IACR Cryptol. ePrint Arch..
[23] Narendra S. Chaudhari,et al. PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks , 2019, Peer-to-Peer Networking and Applications.