ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1708.04027
  4. Cited By
Security for 4G and 5G Cellular Networks: A Survey of Existing
  Authentication and Privacy-preserving Schemes

Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes

14 August 2017
M. Ferrag
Leandros A. Maglaras
A. Argyriou
Dimitrios Kosmanos
Helge Janicke
ArXiv (abs)PDFHTML

Papers citing "Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes"

22 / 22 papers shown
Title
Zero Trust Cybersecurity: Procedures and Considerations in Context
Zero Trust Cybersecurity: Procedures and Considerations in Context
Brady Lund
Tae Hee Lee
Ziang Wang
Ting Wang
Nishith Reddy Mannuru
19
3
0
24 May 2025
Security, Trust and Privacy challenges in AI-driven 6G Networks
Security, Trust and Privacy challenges in AI-driven 6G Networks
Helena Rifa-Pous
Victor Garcia-Font
Carlos Núñez-Gómez
Julian Salas
130
6
0
16 Sep 2024
SoK: Evaluating 5G Protocols Against Legacy and Emerging Privacy and
  Security Attacks
SoK: Evaluating 5G Protocols Against Legacy and Emerging Privacy and Security Attacks
Stavros Eleftherakis
Domenico Giustiniano
Nicolas Kourtellis
88
2
0
10 Sep 2024
Intelligent Control in 6G Open RAN: Security Risk or Opportunity?
Intelligent Control in 6G Open RAN: Security Risk or Opportunity?
Sanaz Soltani
Mohammad Shojafar
Ali Amanlou
Rahim Tafazolli
412
1
0
14 May 2024
Joint Security-vs-QoS Game Theoretical Optimization for Intrusion
  Response Mechanisms for Future Network Systems
Joint Security-vs-QoS Game Theoretical Optimization for Intrusion Response Mechanisms for Future Network Systems
Arash Bozorgchenani
Charilaos C. Zarakovitis
S. Chien
Q. Ni
Antonios Gouglidis
Wissam Mallouli
Heng-Siong Lim
10
1
0
15 Mar 2023
Open RAN Security: Challenges and Opportunities
Open RAN Security: Challenges and Opportunities
Madhusanka Liyanage
An Braeken
Shahriar Shahabuddin
Pasika Sashmal Ranaweera
81
90
0
03 Dec 2022
Network Security Roadmap
Network Security Roadmap
Praveenkumar Kumar
67
1
0
10 Nov 2022
A Survey on Privacy for B5G/6G: New Privacy Challenges, and Research
  Directions
A Survey on Privacy for B5G/6G: New Privacy Challenges, and Research Directions
Chamara Sandeepa
Bartlomiej Siniarski
N. Kourtellis
Shen Wang
Madhusanka Liyanage
88
21
0
08 Mar 2022
Evaluating the Security of Open Radio Access Networks
Evaluating the Security of Open Radio Access Networks
D. Mimran
Ron Bitton
Y. Kfir
Eitan Klevansky
Oleg Brodt
Heiko Lehmann
Yuval Elovici
A. Shabtai
66
25
0
16 Jan 2022
Convergence of 5G with Internet of Things for Enhanced Privacy
Convergence of 5G with Internet of Things for Enhanced Privacy
Amreen Batool
BaoShan Sun
A. Saleem
Jawad Ali
AILaw
42
1
0
03 Jul 2021
A Novel Variable K-Pseudonym Scheme Applied to 5G Anonymous Access
  Authentication
A Novel Variable K-Pseudonym Scheme Applied to 5G Anonymous Access Authentication
Dong Ma
X. Lyu
Renpeng Zou
18
3
0
14 Jun 2021
Security and Privacy in the Emerging Cyber-Physical World: A Survey
Security and Privacy in the Emerging Cyber-Physical World: A Survey
Zhiyuan Yu
Zack Kaplan
Qiben Yan
Ning Zhang
49
32
0
27 May 2021
Beyond PS-LTE: Security Model Design Framework for PPDR Operational
  Environment
Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment
Daegeon Kim
D. Gu
H. Kim
37
5
0
25 Sep 2020
Threat modeling framework for mobile communication systems
Threat modeling framework for mobile communication systems
S. Rao
S. Holtmanns
T. Aura
11
0
0
11 May 2020
Covariance-Robust Dynamic Watermarking
Covariance-Robust Dynamic Watermarking
Matt Olfat
S. Sloan
P. Hespanhol
Matthew Porter
Ram Vasudevan
A. Aswani
AAML
47
9
0
31 Mar 2020
Performance Evaluation of Multiparty Authentication in 5G IIoT
  Environments
Performance Evaluation of Multiparty Authentication in 5G IIoT Environments
Hussain Al-Aqrabi
P. Lane
Richard Hill
17
4
0
16 Jan 2020
A Survey on the Security and the Evolution of Osmotic and Catalytic
  Computing for 5G Networks
A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks
Gaurav Choudhary
Vishal Sharma
36
20
0
19 Sep 2019
CSAI: Open-Source Cellular Radio Access Network Security Analysis
  Instrument
CSAI: Open-Source Cellular Radio Access Network Security Analysis Instrument
Thomas Byrd
Vuk Marojevic
Roger Piqueras Jover
41
8
0
18 May 2019
Threats, Protection and Attribution of Cyber Attacks on Critical
  Infrastructures
Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures
Leandros A. Maglaras
M. Ferrag
A. Derhab
M. Mukherjee
Helge Janicke
Stylianos Rallis
39
29
0
12 Jan 2019
Average Margin Regularization for Classifiers
Average Margin Regularization for Classifiers
Matt Olfat
A. Aswani
OODAAML
23
1
0
09 Oct 2018
Blockchain Technologies for the Internet of Things: Research Issues and
  Challenges
Blockchain Technologies for the Internet of Things: Research Issues and Challenges
M. Ferrag
M. Derdour
M. Mukherjee
A. Derhab
Leandros A. Maglaras
Helge Janicke
64
564
0
24 Jun 2018
Authentication schemes for Smart Mobile Devices: Threat Models,
  Countermeasures, and Open Research Issues
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues
M. Ferrag
Leandros A. Maglaras
A. Derhab
Helge Janicke
86
59
0
27 Mar 2018
1