For Full-Text PDF, please login, if you are a member of IEICE,|
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
A Vulnerability in 5G Authentication Protocols and Its Countermeasure
Xinxin HU Caixia LIU Shuxin LIU Jinsong LI Xiaotao CHENG
IEICE TRANSACTIONS on Information and Systems
Full Text: PDF(506.8KB)