Sign in

Security and Protocol Exploit Analysis of the 5G Specifications.

Roger Piqueras JoverVuk Marojevic
Published in: IEEE Access (2019)
Keyphrases
  • lightweight
  • functional requirements
  • security protocols
  • cryptographic protocols
  • communication protocols
  • network security
  • formal analysis
  • risk analysis
  • security analysis