5G System Security Analysis.
Gerrit HoltrupWilliam LacubeDimitri Percia DavidAlain MermoudGérôme BovetVincent LendersPublished in: CoRR (2021)
Keyphrases
- security analysis
- smart card
- public key
- security requirements
- high security
- security model
- security properties
- image encryption
- encryption scheme
- mutual authentication
- authentication protocol
- encryption algorithm
- private key
- user authentication
- access control policies
- data mining
- proxy signature scheme
- video frames
- similarity search
- digital libraries
- information systems