A Vulnerability in 5G Authentication Protocols and Its Countermeasure

Xinxin HU  Caixia LIU  Shuxin LIU  Jinsong LI  Xiaotao CHENG  

Publication:   IEICE TRANSACTIONS on Information and Systems
Publicized: 2020/03/27
DOI: 10.1587/transinf.2019FOL0001
Full Text: PDF(506.8KB)