Sign in

Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks.

An BraekenMadhusanka LiyanagePardeep KumarJohn Murphy
Published in: IEEE Access (2019)
Keyphrases
  • authentication protocol
  • malicious attacks
  • security protocols
  • malicious users
  • smart card
  • detect malicious
  • image quality
  • real time
  • low cost
  • similarity search
  • public key
  • authentication scheme
  • malicious behavior