Abstract: We study the 5G-AKA authentication protocol described in the 5G mobile communication standards. This version of AKA tries to achieve a better privacy than the 3G and 4G versions through the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results