Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Formal verification of secondary authentication protocol for 5G secondary authentication
Ed Kamya Kiyemba Edris; Mahdi Aiash; Jonathan Kok-Keong Loo; Mohammad Shadi Alhakeem
International Journal of Security and Networks (IJSN), 2021 Vol.16 No.4, pp.223 - 234
4 + 14 =

Thank you for your feedback.