Login / Signup
5G security: Analysis of threats and solutions.
Ijaz Ahmad
Tanesh Kumar
Madhusanka Liyanage
Jude Okwuibe
Mika Ylianttila
Andrei V. Gurtov
Published in:
CSCN (2017)
Keyphrases
</>
security analysis
public key
smart card
high security
security requirements
image encryption
encryption scheme
user authentication
information security
data warehouse
security model
intrusion detection
data integration
countermeasures
authentication protocol
mutual authentication