Machine Learning Protocol for Secure 5G Handovers.
Vincent Omollo NyangaresiAnthony Joachim RodriguesSilvance O. AbekaPublished in: Int. J. Wirel. Inf. Networks (2022)
Keyphrases
- machine learning
- cryptographic protocols
- covert channel
- authentication protocol
- security protocols
- scalar product
- lightweight
- secure routing
- key distribution
- key exchange protocol
- security analysis
- group communication
- multi party
- vertically partitioned data
- decision trees
- homomorphic encryption
- privacy preserving
- secure multiparty computation
- mobile ipv
- diffie hellman
- secure multi party
- password authentication
- machine learning methods
- security properties
- mutual authentication
- machine learning algorithms
- key agreement protocol
- trusted third party
- provably secure
- cryptographic algorithms
- elliptic curve
- ping pong
- key exchange
- secure communication
- mobile agent system
- mobility management
- smart card
- standard model
- learning algorithm
- rfid systems
- key management
- electronic voting
- security requirements
- blind signature
- mobile payment
- user privacy
- security services
- security model
- key agreement
- security issues
- tcp ip
- wireless networks
- data mining