Computer security paper
Paper list
Paper list
288
V-Range: Enabling Secure Ranging in 5G Wireless Networks
5G
Location
Frequency offset attack
488
A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks
Cellular Networks
LTE
5G
Location identification
593
Privacy-Preserving and Standard-Compatible AKA Protocol for 5G
5G