The design of authentication protocols is discussed in depth, and this would also include looking into the role of formal verification in the design of security protocols.
Contents Preface List of Figures List of Tables Acronyms and Abbreviations 1 Introduction 2 Access Security in 2G and 3G Systems 3 Long Term Evolution 4 Access Security for Future Mobile Systems 5 Privacy Matters 6 Principles for Cellular Access Security 7 Authentication and Key Agreement 8 Security Protocol Verification 9 Summary Bibliography Index About the Author