Return to Article Details Security analysis of 5G network authentication and key negotiation protocol. Literature review Download Download PDF