A New Tracking-Attack Scenario Based on the Vulnerability and Privacy Violation of 5G AKA Protocol.
IEEE Access(2022)
关键词
Protocols,5G mobile communication,Authentication,Security,Privacy,Synchronization,Monitoring,Tracking and monitoring attack scenario,vulnerability,exploit,5G AKA protocol,3GPP,authentication and key agreement,privacy violation,TAMARIN prover,srsLTE
AI 理解论文
溯源树
样例

生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要