Randomized 5G AKA Protocol Ensembling Security in Fast Forward Mobile Device
暂无分享,去创建一个
[1] Taekyoung Kwon,et al. Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks , 2018, IEEE Access.
[2] Rose Qingyang Hu,et al. Security for 5G Mobile Wireless Networks , 2018, IEEE Access.
[3] Cjf Cas Cremers. Scyther : semantics and verification of security protocols , 2006 .
[4] Bruno Blanchet,et al. A Computationally Sound Mechanized Prover for Security Protocols , 2008, IEEE Transactions on Dependable and Secure Computing.
[5] David A. Basin,et al. The TAMARIN Prover for the Symbolic Analysis of Security Protocols , 2013, CAV.
[6] Jimmy Ming-Tai Wu,et al. A Sanitization Approach to Secure Shared Data in an IoT Environment , 2019, IEEE Access.
[7] Ralf Sasse,et al. A Formal Analysis of 5G Authentication , 2018, CCS.
[8] Garima Chopra,et al. Possible Security Attack Modeling in Ultradense Networks Using High-Speed Handover Management , 2018, IEEE Transactions on Vehicular Technology.
[9] 田端 利宏,et al. Network and Distributed System Security Symposiumにおける研究動向の調査 , 2004 .
[10] An Braeken,et al. Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks , 2019, IEEE Access.
[11] Edgar Weippl,et al. On Security Research Towards Future Mobile Network Generations , 2017, IEEE Communications Surveys & Tutorials.
[12] Ravishankar Borgaonkar,et al. New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols , 2019, IACR Cryptol. ePrint Arch..
[13] Peng Zhang,et al. A Survey on C-RAN Security , 2017, IEEE Access.
[14] Stig Fr. Mjølsnes,et al. A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols , 2012, MMM-ACNS.
[15] Ming Wang,et al. Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks , 2017, IEEE Access.
[16] Elisa Bertino,et al. LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE , 2018, NDSS.