Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability.
An BraekenPublished in: Comput. Networks (2020)
Keyphrases
- authentication protocol
- security analysis
- privacy protection
- security protocols
- public key
- security properties
- data protection
- smart card
- key distribution
- security requirements
- diffie hellman
- lightweight
- secret key
- key management
- rfid tags
- cryptographic protocols
- encryption algorithm
- security mechanisms
- information loss
- privacy preserving
- encryption scheme
- statistical databases
- data sharing
- sensitive data
- security services
- data collection
- data streams
- private key