2022
DOI: 10.1007/978-981-16-9576-6_23
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-Based User Identity Authentication Method for 5G

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…In WLAN, EAP-MD5 is one of several common authentication methods. The authentication entity in EAP-MD5 consists of Client, Device, and Server [36]. EAP-MD5 authentication method consists of two phases: registration and authentication.…”
Section: Eap-md5mentioning
confidence: 99%
“…In WLAN, EAP-MD5 is one of several common authentication methods. The authentication entity in EAP-MD5 consists of Client, Device, and Server [36]. EAP-MD5 authentication method consists of two phases: registration and authentication.…”
Section: Eap-md5mentioning
confidence: 99%
“…To evaluate the performance of the proposed WPUB-BCP protocol, we deploy the specific control methods in each module (SA and SC). In our previous work [30], an authentication method based on EAP-MD5 is proposed for fast authenticate. erefore, in the IAM module, we use the same authentication method to represent the trusted authentication protocol f, so as to ensure the trusted user identity.…”
Section: Prototype Systemmentioning
confidence: 99%