Issues of identity verification of typical applications over mobile terminal platform

Recent studies have shown that attacks against USIM card are increasing,and an attacker can use the cloned USIM card to bypass the identity verification process in some applications and thereby get the unauthorized access.Considering the USIM card being cloned easily even under 5G network,the identi...

Full description

Saved in:
Bibliographic Details
Main Authors: Xiaolin ZHANG, Dawu GU, Chi ZHANG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2020-12-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020081
Tags: Add Tag
No Tags, Be the first to tag this record!