Publisher
Springer Science and Business Media LLC
Subject
General Earth and Planetary Sciences,General Environmental Science
Reference16 articles.
1. Ahmed, I., Khammari, H., Shahid, A., Musa, A., Kim, K.S., De Poorter, E., Moerman, I.: A survey on hybrid beamforming techniques in 5G: architecture and system model perspectives. IEEE Commun. Surv. Tutorials 20(4), 3060–3097 (2018)
2. Arapinis, M., Mancini, L. I., Ritter, E., Ryan, M., Golde, N., Redon, K., Borgaonkar, R.: New privacy issues in mobile telephony: fix and verification. Proceedings of the 2012 ACM conference on computer and communications security, CCS’12, Raleigh, NC, USA, October 16–18 (2012)
3. Basin, D. A., Dreier, J., Hirschi, L., Radomirovic, S., Sasse, R., Stettler, V.: A formal analysis of 5G authentication. Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, CCS 2018, Toronto, ON, Canada, October 15–19 (2018)
4. Bertino, E.: It takes a village to secure cellular networks. IEEE Security Privacy 17(5), 95–96 (2019)
5. Bogale, T.E., Wang, X., Le, L.B.: mmWave communication enabling techniques for 5G wireless systems: a link level perspective. In: Mumtaz, S., Rodriguez, J., Dai, L. (eds.) mmWave Massive MIMO—a paradigm for 5G. Elsevier, Netherlands (2017)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Digital Forensics in IoT Enabled Smart Environment: Need of the Hour;2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS);2022-11-04