I had no idea it was so complicated. My Master courses were in Information Security, and I thought those were complicated. I don't even want to think about 3G or 4G. Is it any fundamental different though? I mean, apart from fixing the problems you have mentioned.
I have followed, so I will read the article for sure :D
Thanks for sharing your knowledge on the subject!
You are viewing a single comment's thread from:
Hi @alexdory. It's complicated when you look at the procedure as a whole but the principles are reasonably straightforward.
3G authentication is an evolution rather than a revolution. Working on that in my next post.
4G re-uses 3G authentication so that's the good news ! ;-)
Thanks for reading!