Formal Analysis of 5G Authentication and Key Management for Applications (AKMA).
Tengshun YangShuling WangBohua ZhanNaijun ZhanJinghui LiShuangqing XiangZhan XiangBifei MaoPublished in: J. Syst. Archit. (2022)
Keyphrases
- formal analysis
- key management
- key distribution
- symmetric key
- security services
- identity based cryptography
- ban logic
- secure communication
- authentication scheme
- wireless sensor networks
- resource constrained
- ad hoc networks
- key management scheme
- security mechanisms
- encryption decryption
- secret key
- formal methods
- security protocols
- key establishment
- digital signature
- provably secure
- agent model
- secret sharing scheme
- private key
- elliptic curve
- diffie hellman
- routing algorithm
- end to end
- artificial intelligence
- public key cryptography
- user authentication