Login / Signup

The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks.

Teng FeiWenye Wang
Published in: Comput. Networks (2023)
Keyphrases