Cited By
View all- Pacherkar HYan GKim YKim JKoushanfar FRasmussen K(2024)PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance GraphsProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656129(254-264)Online publication date: 27-May-2024
- Rossi Figlarz GPassuelo Hessel F(2024)Enhancing the 5G-AKA Protocol with Post-quantum Digital Signature MethodAdvanced Information Networking and Applications10.1007/978-3-031-57916-5_9(99-110)Online publication date: 9-Apr-2024
- Chen YTang DYao YZha MWang XLiu XTang HLiu BCalandrino JTroncoso C(2023)Sherlock on specsProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620435(3529-3545)Online publication date: 9-Aug-2023
- Show More Cited By