Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Secondary Authentication Method Suitable for 5G-Based Power Terminals and Formal Analysis

    In the 5G network, the access method of IoT terminals is mainly wireless access. Aiming at the high authentication cost in massive access scenarios, this paper proposes a secondary authentication method based ...

    **n Hu, Yu Jiang, Aiqun Hu in Conference Proceedings of 2022 2nd Interna… (2023)