Author:
Geng Guining,Miao Junfeng,Xiao Nan
Publisher
Springer Nature Switzerland
Reference25 articles.
1. Next Generation Mobile Networks, white paper: Alliance N. 5Gwhitepaper, pp. 1–125 (2015)
2. Bargh, M.S., et al.: UMTS-AKA and EAP-AKA inter-working for fast handovers in All-IP networks. In: IEEE Globecom Workshops, pp. 1–6 (2008). https://doi.org/10.1109/GLOCOMW.2007.4437814
3. Security Architecture and Procedures for 5G System, document 3GPP, TS33.501 (2019). www.3gpp.org/DynaReport/33501.htm. Accessed 26 Jan 2019
4. Basin, D., et al.: A formal analysis of 5g authentication. In: 2018 ACM SIGSAC, pp. 1383–1396 (2018). https://doi.org/10.1145/3243734.3243846
5. Jover, R.P., et al.: Security and protocol exploit analysis of the 5G specifications. IEEE Access, 1–1 (2019). https://doi.org/10.1109/ACCESS.2019.2899254