Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be …
K Yue, Y Zhang, Y Chen, Y Li, L Zhao… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Trusted third parties (TTPs) are frequently used for serving as an authority to issue and verify transactions in applications. Although the TTP-based paradigm provides customers with …
J Cao, M Ma, H Li, R Ma, Y Sun, P Yu… - … surveys & tutorials, 2019 - ieeexplore.ieee.org
With the continuous development of mobile communication technologies, Third Generation Partnership Project (3GPP) has proposed related standards with the fifth generation mobile …
Every attempt to access to the Internet through a Web browser, email sent, VPN connection, VoIP call, instant message or other use of telecommunications systems involves …
Computer-aided cryptography is an active area of research that develops and applies formal, machine-checkable approaches to the design, analysis, and implementation of …
Due to the rapid development of the fifth-generation (5G) applications, and increased demand for even faster communication networks, we expected to witness the birth of a new …
Recent advancements in vehicle-to-everything (V2X) communication have notably improved existing transport systems by enabling increased connectivity and driving autonomy levels …
B Tezergil, E Onur - IEEE Communications Surveys & Tutorials, 2022 - ieeexplore.ieee.org
With the introduction of new technologies such as Unmanned Aerial Vehicle (UAV), High Altitude Platform Station (HAPS), Millimeter Wave (mmWave) frequencies, Massive Multiple …
The paper proposes 5GReasoner, a framework for property-guided formal verification of control-plane protocols spanning across multiple layers of the 5G protocol stack. The …