Login / Signup

Techniques for Realizing Secure, Resilient and Differentiated 5G Operations.

Akram HakiriAniruddha S. GokhaleYogesh D. BarveValerio FormicolaShashank ShekharCharif MahmoudiMohammad Ashiqur RahmanUttam GhoshSyed Rafay HasanTerry N. Guo
Published in: WMNC (2022)
Keyphrases
  • secret key
  • secure communication
  • key distribution
  • key exchange protocol
  • knowledge base
  • website
  • database
  • data sets
  • databases
  • neural network
  • learning algorithm
  • peer to peer