Login / Signup
A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network.
Ruhui Ma
Jin Cao
Shiyang He
Yinghui Zhang
Ben Niu
Hui Li
Published in:
IEEE Trans. Netw. Serv. Manag. (2024)
Keyphrases
</>
authentication scheme
computer networks
peer to peer
network traffic
smart card
user authentication
data mining
database systems
digital libraries
feature vectors
security analysis
authentication protocol
image authentication
image encryption
security flaws