Login / Signup
Threats to 5G Group-based Authentication.
Rosario Giustolisi
Christian Gehrmann
Published in:
SECRYPT (2016)
Keyphrases
</>
security services
genetic algorithm
countermeasures
biometric authentication
data sets
neural network
digital images
information security
security requirements
security analysis
cyber security
identity management