Login / Signup
Formal Analysis of 5G Authentication.
David A. Basin
Jannik Dreier
Lucca Hirschi
Sasa Radomirovic
Ralf Sasse
Vincent Stettler
Published in:
CoRR (2018)
Keyphrases
</>
formal analysis
ban logic
formal methods
fragile watermarking
agent model
user authentication
image authentication
power consumption
security analysis
biometric authentication
security requirements
authentication protocol
authentication scheme