Login / Signup
Security Analysis of 5G Network.
John A. Khan
M. D. Minhaz Chowdhury
Published in:
EIT (2021)
Keyphrases
</>
security analysis
public key
computer networks
image encryption
smart card
network traffic
security requirements
security model
high security
data mining
information systems
security properties
authentication scheme
similarity measure
encryption scheme
mutual authentication