Linked e-resources
Details
Table of Contents
Introduction
Secure communications in 5G and IoT networks
Authentication and key exchange protocols in 5G and IoT networks
Formal security analysis on security protocols for 5G and IoT networks
Developing secure communication systems or environments
Security risk management and assessment in 5G and IoT networks
Usability and human factor issues and studies with 5G and IoT networks
Privacy and trust in 5G and IoT networks
Infrastructure for secure communications
Balancing security and quality services in 5G and IoT networks
Emerging security issues in 5G and IoT networks
Intelligent IoT in 5G Security
Practical Aspects for the Integration of 5G Networks and IoT Applications security issues
Secure 5G IoT use case
Blockchain used 5G IoT applications
Conclusion.
Secure communications in 5G and IoT networks
Authentication and key exchange protocols in 5G and IoT networks
Formal security analysis on security protocols for 5G and IoT networks
Developing secure communication systems or environments
Security risk management and assessment in 5G and IoT networks
Usability and human factor issues and studies with 5G and IoT networks
Privacy and trust in 5G and IoT networks
Infrastructure for secure communications
Balancing security and quality services in 5G and IoT networks
Emerging security issues in 5G and IoT networks
Intelligent IoT in 5G Security
Practical Aspects for the Integration of 5G Networks and IoT Applications security issues
Secure 5G IoT use case
Blockchain used 5G IoT applications
Conclusion.