ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1809.06925
  4. Cited By
Security and Protocol Exploit Analysis of the 5G Specifications

Security and Protocol Exploit Analysis of the 5G Specifications

18 September 2018
Roger Piqueras Jover
Vuk Marojevic
ArXivPDFHTML

Papers citing "Security and Protocol Exploit Analysis of the 5G Specifications"

5 / 5 papers shown
Title
The 5G-AKA Authentication Protocol Privacy
The 5G-AKA Authentication Protocol Privacy
Adrien Koutsos
27
92
0
16 Nov 2018
Defeating the Downgrade Attack on Identity Privacy in 5G
Defeating the Downgrade Attack on Identity Privacy in 5G
Mohsin Khan
Philip Ginzboorg
B. Motik
Valtteri Niemi
40
28
0
06 Nov 2018
A Formal Analysis of 5G Authentication
A Formal Analysis of 5G Authentication
David Basin
Jannik Dreier
L. Hirschi
S. Radomirovic
R. Sasse
Vincent Stettler
34
365
0
27 Jun 2018
LTE security, protocol exploits and location tracking experimentation
  with low-cost software radio
LTE security, protocol exploits and location tracking experimentation with low-cost software radio
Roger Piqueras Jover
34
70
0
18 Jul 2016
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile
  Communication Systems
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems
Altaf Shaik
Ravishankar Borgaonkar
Nadarajah Asokan
Valtteri Niemi
Jean-Pierre Seifert
36
299
0
26 Oct 2015
1