This is the implementation of the 5G-AKA for the master thesis: Identity management, identification mechanisms and privacy protection methods in 5G
☆11Jul 22, 2019Updated 6 years ago
Alternatives and similar repositories for 5G-AKA-simulation-in-C
Users that are interested in 5G-AKA-simulation-in-C are comparing it to the libraries listed below
Sorting:
- Open5GS 5GC & UERANSIM UE / RAN Sample Configuration☆79May 5, 2024Updated last year
- All in one iOS and Android app for Payments and DeFi powered by ZK Rollups and Ethereum Blockchain.☆12Jan 26, 2023Updated 3 years ago
- A curated list of resources for the æternity blockchain☆14Aug 12, 2024Updated last year
- Continual Learning for Transformers that allows training on multiple tasks sequentially while preserving knowledge from earlier tasks usi…☆17Aug 8, 2025Updated 6 months ago
- chainlink demos☆12Apr 9, 2018Updated 7 years ago
- Open source RAN UE centric security testing software.☆14Feb 13, 2026Updated 2 weeks ago
- [IEEE TMI 2024] GC2: Generalizable Continual Classification of Medical Images☆10Jun 4, 2024Updated last year
- Ether cross chain atomic swap smart contract☆10Mar 28, 2019Updated 6 years ago
- Go implementation of the Extrēmus. Extrēmus is the first public blockchain platform based on the combination of Jigsaw-puzzle DAG and Sha…☆13Aug 22, 2018Updated 7 years ago
- simple golang deep learning framework☆10Jul 5, 2021Updated 4 years ago
- ☆10Jul 25, 2019Updated 6 years ago
- SIM-based QR-code authentication for basic and feature phones☆13Apr 24, 2023Updated 2 years ago
- ml,5G,Handover,predict☆10Jul 24, 2018Updated 7 years ago
- A LLM-based solver implementation for an intent-centric future on Ethereum.☆13Sep 24, 2023Updated 2 years ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- PoC of five Slow Rate HTTP/2 DoS attacks seen in a research paper☆10Mar 31, 2018Updated 7 years ago
- 域名接管漏洞,批量检测工具☆11Oct 29, 2020Updated 5 years ago
- Algorand flutter wallet☆11Mar 24, 2021Updated 4 years ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆13Aug 27, 2024Updated last year
- Zero Knowledge proof for point doubling on baby JubJub elliptic curve, using Zokrates☆12Nov 20, 2018Updated 7 years ago
- Code for our 2024 ACM AsiaCCS Paper "Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact"☆17Dec 19, 2025Updated 2 months ago
- ☆18Nov 6, 2024Updated last year
- Java Card applet with REFRESH command support for SIM Toolkit application☆17Aug 2, 2020Updated 5 years ago
- A collection of cosmWASM contracts for desmos network☆12Nov 7, 2023Updated 2 years ago
- lightweight web-framework based on reactive-streams☆17Dec 2, 2018Updated 7 years ago
- ☆14Feb 18, 2026Updated 2 weeks ago
- An http2 stack living on top of scapy☆11Oct 24, 2018Updated 7 years ago
- Template for doing a peer reviewed security on EOS C++ contract code☆16Jan 14, 2019Updated 7 years ago
- A programming language for FPGAs.☆20May 5, 2018Updated 7 years ago
- Experimental 5G UPF☆12Jan 19, 2026Updated last month
- Useful apps and snippets to handle Algorand transactions☆11Dec 16, 2020Updated 5 years ago
- Helper for using Aave's credit delegation☆17Oct 1, 2021Updated 4 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆13Oct 3, 2024Updated last year
- My solutions from the Introductory C Programming Specialization by Duke University on Coursera.☆13Apr 15, 2024Updated last year
- Tendermint ZK Light Client for ibc-solidity☆14Apr 25, 2024Updated last year
- A program for collecting subdomains of a list of given second-level domains (SLD)☆15Feb 10, 2026Updated 3 weeks ago
- Explore the http3 by quic with examples☆15Jul 28, 2022Updated 3 years ago
- Integration of IBC with Starknet☆21Sep 16, 2025Updated 5 months ago
- Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings☆18Sep 1, 2025Updated 6 months ago