Z Cui, B Cui, L Su, H Du, H Wang,
J Fu - International Symposium on …, 2022 - Springer
The security context used in 5G authentication is generated during the Authentication and
Key Agreement (AKA) procedure and stored in both the user equipment (UE) and the …