Signalling Security Analysis: Is HTTP/2 Secure in 5G Core Network?
Xinxin HuCaixia LiuShuxin LiuWei YouYu ZhaoPublished in: WCSP (2018)
Keyphrases
- security analysis
- security requirements
- smart card
- encryption scheme
- security properties
- security model
- public key
- authentication protocol
- user authentication
- mutual authentication
- high security
- open source
- private key
- key exchange
- image encryption
- network traffic
- stream cipher
- wireless sensor networks
- computer networks
- peer to peer
- authentication scheme