1 |
|
2 |
LUBNA N, AWAIS M A, YASAR A, et al. Integration of D2D, network slicing, and MEC in 5G cellular network: survey and challenges. IEEE Access, 2021, 9, 37590- 37612.
doi: 10.1109/ACCESS.2021.3063104
|
3 |
DAIFALLAH A. Survey on network slice isolation in 5G networks: fundamental challenges. Procedia Computer Science, 2021, 182, 38- 45.
doi: 10.1016/j.procs.2021.02.006
|
4 |
HEGDE P, MEENA S M. A survey on 5G network slicing-epitome and opportunities for a novice[C]//Proceedings of International Conference on Computing Communication and Networking Technologies (ICCCNT). Washington D. C., USA: IEEE Press, 2021: 1-5.
URL
|
5 |
|
6 |
|
7 |
|
8 |
|
9 |
|
10 |
马媛媛, 李尼格, 邵志鹏, 等. 适用于电力5G终端的二次认证方法及其形式化分析. 自动化与仪表, 2022, 37(11): 103- 108.
doi: 10.19557/j.cnki.1001-9944.2022.11.021
|
|
MA Y Y, LI N G, SHAO Z P, et al. Secondary authentication method suitable for power 5G terminal and its formal analysis. Automation & Instrumentation, 2022, 37(11): 103- 108.
doi: 10.19557/j.cnki.1001-9944.2022.11.021
|
11 |
HAO Q F, SUN L, GUO S H, et al. 5G secondary authentication based on EAP-TLS protocol[C]//Proceedings of International Conference on Computer Technology and Media Convergence Design (CTMCD). Washington D. C., USA: IEEE Press, 2021: 296-300.
URL
|
12 |
李长隆, 古毅, 王俊. 5G二次认证协议的分析与设计. 通信技术, 2019, 52(7): 1733- 1739.
doi: 10.3969/j.issn.1002-0802.2019.07.033
|
|
LI C L, GU Y, WANG J. Analysis and design of secondary authentication protocol in 5G. Communication Technology, 2019, 52(7): 1733- 1739.
doi: 10.3969/j.issn.1002-0802.2019.07.033
|
13 |
GONG S, EL AZZAOUI A, CHA J, et al. Secure secondary authentication framework for efficient mutual authentication on a 5G data network. Applied Sciences, 2020, 10(2): 727.
doi: 10.3390/app10020727
|
14 |
EDRIS E K K, AIASH M, LOO J K K. Network service federated identity (NS-FId) protocol for service authorization in 5G network[C]//Proceedings of the 15th International Conference on Fog and Mobile Edge Computing (FMEC). Washington D. C., USA: IEEE Press, 2020: 128-135.
URL
|
15 |
EDRIS K K E, AIASH M, LOO K K J. Formal veritication of secondary authentication potocol for 5G secondary authentication. International Journal of Security and Networks, 2021, 16(4): 223- 234.
doi: 10.1504/IJSN.2021.119379
|
16 |
LI X H, LIU H, WEI F S, et al. A lightweight anonymous authentication protocol using k-pseudonym set in wireless networks[C]//Proceedings of 2015 IEEE Global Communications Conference. Washington D. C., USA: IEEE Press, 2015: 113-120.
URL
|
17 |
|
18 |
CREMERS C J F, DEHNEL-WILD M. Component-based formal analysis of 5G-AKA: channel assumptions and session confusion[C]//Proceedings of Conference on Network and Distributed System Security Symposium (NDSS). [S. l. ]: AAAI Press, 2019: 23-31.
URL
|
19 |
刘彩霞, 胡鑫鑫, 刘树新, 等. 基于Lowe分类法的5G网络EAP-AKA'协议安全性分析. 电子与信息学报, 2019, 41(8): 1800- 1807.
doi: 10.11999/JEIT190063
|
|
LIU C X, HU X X, LIU S X, et al. Security analysis of 5G network EAP-AKA' protocol based on Lowe's taxonomy. Journal of Electronics and Information, 2019, 41(8): 1800- 1807.
doi: 10.11999/JEIT190063
|
20 |
KWIATKOWSKA M, NORMAN G, PARKER D. Advances and challenges of probabilistic model checking[C]//Proceedings of Conference on Communication, Control, and Computing. Washington D.C., USA: IEEE Press, 2010: 1691-1698.
URL
|
21 |
KWIATKOWSKA M, NORMAN G, PARKER D. PRISM 4.0: verification of probabilistic real-time systems[C]//Proceedings of the 23rd International Conference on Computer Aided Verification. Berlin, Germany: Springer, 2011: 585-591.
|
22 |
KWIATKOWSKA M, NORMAN G, PARKER D. Probabilistic model checking: advances and applications[M]//DRECHSLER R, Formal system verification: state-of the-art and future trends. Berlin, Germany: Springer, 2017: 73-121.
|
23 |
HINTON A, KWIATKOWSKA M, NORMAN G, et al. PRISM: a tool for automatic verification of probabilistic systems[C]//Proceedings of International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Berlin, Germany: Springer, 2006: 441-444.
URL
|
24 |
SONG S Z, GUI L, SUN J, et al. Improved reachability analysis in DTMC via divide and conquer[C]//Proceedings of the 10th International Conference on Integrated Formal Methods. Berlin, Germany: Springer, 2013: 162-176.
URL
|
25 |
LIU Y, LI X D, MA Y. A game-based approach for PCTL *stochastic model checking with evidence. Journal of Computer Science and Technology, 2016, 31, 198- 216.
doi: 10.1007/s11390-016-1621-y
|