نتایج جستجو برای: aka
تعداد نتایج: 1885 فیلتر نتایج به سال:
Secure communications between mobile subscribers and their associated operator networks require mutual authentication and key derivation protocols. The 3GPP standard provides the AKA protocol for just this purpose. Its structure is generic, to be instantiated with a set of seven cryptographic algorithms. The currently-used proposal instantiates these by means of a set of AES-based algorithms ca...
The standardized Authentication and Key Agreement protocol for 5G networks (5G AKA) have several security privacy vulnerabilities. In this paper, we propose a novel authentication key agreement beyond that is compatible with the AKA. Our has properties, e.g., perfect forward secrecy, resistance against linkability attacks, protection malicious SNs. Moreover, both user identity secrecy are handl...
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a public-key infrastructure (PKI) or identity-based cryptography. However, the former suffers from a heavy certificate management burden while the latter is subject to the s...
The 5th generation mobile communication technology (5G) authentication and key management (AKA) protocol specified by the 3rd partnership project (3GPP) includes three cases because it introduces synchronization failure message code (MAC) procedures. Thus, there may be interactions between these cases, forming vulnerabilities that do not exist in any single case. However, this is fully consider...
INTRODUCTION Lower limb amputation (LLA) is life-changing surgery. Shorter residual limbs are known to place greater physiological strain on patients than longer residual limbs; however, there is ongoing debate as to whether through-knee amputations are preferable to above-knee amputations. This analysis aims to resolve this question by systematically collecting and pooling published and unpubl...
We have observed that antidextran hybridomas with potential N-linked glycosylation sites in VH have higher affinity for polymeric dextran and for isomaltoheptaose than those lacking potential glycosylation sites. In these studies we have used gene transfection and expression techniques to verify that the carbohydrate addition sites in VH were used. The carbohydrate of the VH region was accessib...
Content Determination (aka Content Selection)
BACKGROUND After septic failure of total knee arthroplasty (TKA) and multiple revision operations resulting in impaired function, bone and/or soft-tissue damage a reconstruction with a revision arthroplasty might be impossible. Salvage procedures to regain mobility and quality of life are an above-the-knee amputation or knee arthrodesis. The decision process for the patient and surgeon is diffi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید