Report copyright - Exposing LTE Security Weaknesses at Protocol Inter-Layer ...web.cs.ucla.edu/~taqi/publications/securecom_2017.pdf · 2.1 LTE protocol inter-layer interaction LTE protocol’s functionality
Please pass captcha verification before submit form