Useful Links
Computer Science
Computer Networking
Wireless Communication
5G
1. Introduction to Cellular Wireless Technology
2. 5G Fundamentals and Objectives
3. 5G Spectrum Management
4. 5G Radio Access Network Technologies
5. 5G Network Architecture
6. Advanced 5G Technologies
7. 5G Security Framework
8. 5G Applications and Use Cases
9. 5G Evolution and Future Technologies
5G Security Framework
Security Architecture Evolution
5G Security Enhancements
Threat Model Updates
Security Domains
Trust Boundaries
Authentication and Privacy
5G Authentication Protocols
5G-AKA Procedure
EAP-AKA' Procedure
Fast Re-Authentication
Subscriber Privacy Protection
Subscription Concealed Identifier
Location Privacy
Identity Protection
Key Management
Key Hierarchy
Key Derivation Functions
Key Distribution
Key Refresh Procedures
Network Security
Inter-Network Security
Security Edge Protection Proxy
Network Domain Security
Roaming Security
Network Slicing Security
Slice Isolation
Slice Authentication
Inter-Slice Security
Slice-Specific Policies
Virtualization Security
Hypervisor Security
Container Security
Virtual Network Function Security
Orchestration Security
Emerging Security Challenges
IoT Security
Device Authentication
Lightweight Cryptography
Device Management
Firmware Updates
Edge Computing Security
Edge Node Security
Data Protection at Edge
Secure Computation
Trust Management
AI/ML Security
Model Protection
Adversarial Attacks
Privacy-Preserving ML
Federated Learning Security
Previous
6. Advanced 5G Technologies
Go to top
Next
8. 5G Applications and Use Cases