A formal security analysis of the fast authentication procedure based on the security context in 5G networks.
Zhiwei CuiBaojiang CuiLi SuHaitao DuJie XuJunsong FuPublished in: Soft Comput. (2024)
Keyphrases
- security analysis
- security requirements
- high security
- security properties
- symmetric key
- security model
- public key
- authentication protocol
- user authentication
- smart card
- private key
- elliptic curve cryptography
- internet banking
- key exchange
- encryption scheme
- mutual authentication
- authentication scheme
- encryption algorithm
- image encryption
- security mechanisms
- information security
- security policies
- information systems
- computer networks