订阅小程序
旧版功能

A New Tracking-Attack Scenario Based on the Vulnerability and Privacy Violation of 5G AKA Protocol.

Ya-Chu Cheng,Chung-An Shen

IEEE Access(2022)

引用 4|浏览4
关键词
Protocols,5G mobile communication,Authentication,Security,Privacy,Synchronization,Monitoring,Tracking and monitoring attack scenario,vulnerability,exploit,5G AKA protocol,3GPP,authentication and key agreement,privacy violation,TAMARIN prover,srsLTE
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要