Cited By
View all- Cui ZCui BXu JFu J(2025)A Systematic Security Analysis for Beyond 5G Non-Access Stratum Protocol from the Perspective of Network CoexistenceInformation Systems Frontiers10.1007/s10796-025-10586-2Online publication date: 18-Feb-2025
- Gegenhuber GFrenzel PWeippl EOkoshi TKo JLiKamWa R(2024)Why E.T. Can’t Phone Home: A Global View on IP-based Geoblocking at VoWiFiProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661883(183-195)Online publication date: 3-Jun-2024
- Shi JWang SChen MTu GXie TChen MHu YLi CPeng CGanesan DShi W(2024)IMS is Not That Secure on Your 5G/4G PhonesProceedings of the 30th Annual International Conference on Mobile Computing and Networking10.1145/3636534.3649377(513-527)Online publication date: 29-May-2024
- Show More Cited By