C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
A Vulnerability in 5G Authentication Protocols and Its Countermeasure.
Xinxin Hu
Caixia Liu
Shuxin Liu
Jinsong Li
Xiaotao Cheng
Published in:
IEICE Trans. Inf. Syst. (2020)
Keyphrases
</>
authentication protocol
smart card
security analysis
information security
lightweight
countermeasures
public key
rfid tags
security protocols
ban logic
cryptographic protocols
hash functions
secret key
rfid systems
information systems
security requirements