- Home
- Publications
- Publication Search
- Publication Details
Title
Study on Security and Privacy in 5G-Enabled Applications
Authors
Keywords
-
Journal
WIRELESS COMMUNICATIONS & MOBILE COMPUTING
Volume 2020, Issue -, Pages 1-15
Publisher
Hindawi Limited
Online
2020-12-22
DOI
10.1155/2020/8856683
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Understanding security failures of multi-factor authentication schemes for multi-server environments
- (2019) Ding Wang et al. COMPUTERS & SECURITY
- On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices
- (2018) Ding Wang et al. IEEE Systems Journal
- Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
- (2018) Mohamed Amine Ferrag et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- 5G Radio Access Network Design with the Fog Paradigm: Confluence of Communications and Computing
- (2017) Yu-Jen Ku et al. IEEE COMMUNICATIONS MAGAZINE
- Efficient 5G Small Cell Planning With eMBMS for Optimal Demand Response in Smart Grids
- (2017) Navrati Saxena et al. IEEE Transactions on Industrial Informatics
- A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme
- (2017) Lidong Han et al. WIRELESS PERSONAL COMMUNICATIONS
- A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing
- (2017) Sultan Basudan et al. IEEE Internet of Things Journal
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
- (2016) Anna L. Buczak et al. IEEE Communications Surveys and Tutorials
- SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system
- (2016) Hanguang Luo et al. WIRELESS NETWORKS
- Authentication handover and privacy protection in 5G hetnets using software-defined networking
- (2015) Xiaoyu Duan et al. IEEE COMMUNICATIONS MAGAZINE
- Biological characteristic online identification technique over 5G network
- (2015) Xingang Liu et al. IEEE WIRELESS COMMUNICATIONS
- Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
- (2015) Ding Wang et al. INFORMATION SCIENCES
- An improved secure and efficient password and chaos-based two-party key agreement protocol
- (2015) Yu Liu et al. NONLINEAR DYNAMICS
- Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
- (2015) Qi Jiang et al. NONLINEAR DYNAMICS
- Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G
- (2015) Kai Fan et al. Security and Communication Networks
- A survey of millimeter wave communications (mmWave) for 5G: opportunities and challenges
- (2015) Yong Niu et al. WIRELESS NETWORKS
- Visions Towards 5G: Technical Requirements and Potential Enablers
- (2015) Liljana Gavrilovska et al. WIRELESS PERSONAL COMMUNICATIONS
- Smart Grid — The New and Improved Power Grid: A Survey
- (2011) Xi Fang et al. IEEE Communications Surveys and Tutorials
- Two-factor user authentication in wireless sensor networks
- (2009) Manik Lal Das IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started