5G Handover: When Forward Security Breaks.
Navya SivaramanSimin Nadjm-TehraniPublished in: SECRYPT (2023)
Keyphrases
- information security
- statistical databases
- security requirements
- security problems
- access control
- security issues
- security policies
- intrusion detection
- security mechanisms
- security threats
- data security
- security properties
- key management
- cyber security
- mobile communication
- forward and backward
- security management
- information systems
- security measures
- security model
- bi directional
- network security
- privacy preserving