Author:
Cremers Cas,Dehnel-Wild Martin
Cited by
72 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Provably Secure Communication Protocols for Remote Attestation;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. Examining Cryptography and Randomness Failures in Open-Source Cellular Cores;Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy;2024-06-19
3. PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance Graphs;Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks;2024-05-27
4. 5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions;Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks;2024-05-27
5. Observational equivalence and security games: Enhancing the formal analysis of security protocols;Computers & Security;2024-05