Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

key business driver

biblio

Visible to the public An Approach for End-to-End (E2E) Security of 5G Applications

Submitted by aekwall on Mon, 11/23/2020 - 11:23am
  • heterogeneous networked society
  • 5G Applications
  • 5G protocols
  • attack resistance rate
  • dependable security mechanism
  • differentiated security
  • diffie hellman key exchange
  • E2E
  • End to End Security analysis
  • End-to-End data protection
  • end-to-end security
  • flexible security mechanism
  • 3D PAKE protocol
  • industrial vision
  • Internet Security Protocols
  • key business driver
  • manifold applications
  • networking paradigms
  • next-generation mobile technology
  • security defensive rate
  • Tetrahedron property analysis
  • Intelligent Data Security
  • Intelligent Data and Security
  • security threats
  • Scalability
  • Servers
  • attack surface
  • Cryptographic Protocols
  • Protocols
  • Resiliency
  • pubcrawl
  • internet
  • authentication
  • message authentication
  • 5G mobile communication
  • computer network security
  • Elliptic curve cryptography
  • security operations
  • heterogeneous environment
  • Compositionality
  • Three-dimensional displays
  • confidentiality
  • communication complexity
  • computation complexity
  • Resistance
  • key management

Terms of Use  |  ©2023. CPS-VO