Login / Signup
Formalization and evaluation of EAP-AKA' protocol for 5G network access security.
Ed Kamya Kiyemba Edris
Mahdi Aiash
Jonathan Loo
Published in:
Array (2022)
Keyphrases
</>
network access
wireless networks
network connection
network security
cloud computing
security policies
security protocols
cryptographic protocols
information security
virtual machine
wifi
access control
computer simulation
authentication protocol
data mining
intrusion detection