Ai Feedback
Exact(5)
In such a method, the independence between the authentication framework and communication modules is achieved.
At present, USIM just realizes the independence between AKA algorithm and communication technologies, but it cannot integrate other authentication methods to realize the independence between the authentication framework and communication technologies.
And we point out the fundamental reason is that USIM just supports one authentication algorithm AKA which is not extensible, furthermore it cannot provide the independence between the authentication framework and underlying communication technologies.
(3) The independence between the authentication framework and the underlying communication technologies enables the re-use of existing authentication protocols (e.g., EAP-TLS [28]), which reduces the possibility of developing new authentication protocols for emerging communication technologies.
In such a way, the framework is extensible and the independence between the authentication framework and underlying communication technologies is also achieved, which enables USIM and the networks server to negotiate and run a suitable authentication protocol according to the specific scenario and output keys in a unified format.
Similar(55)
In such a method, USIM is extensible in authentication algorithms and the authentication framework is independent of the communication technologies.
The underlying reason is the authentication algorithm is not extensible and the authentication framework is not independent of the communication technologies.
In such a way, USIM is extensible in authentication algorithms and the authentication framework is independent of the underlying communication technologies.
In order to overcome the drawbacks mentioned above, we propose a uniform access authentication method based on USIM, which enables the authentication framework independent from communication technologies, and provides the extensibility to the authentication method.
In the following, we will analyze the influence resulting from the authentication framework in those three parts.
We find that the fundamental reason resulting in the drawbacks mentioned above is the present USIM is not extensible in terms of authentication algorithm and the authentication framework is not independent of communication technology.
Write better and faster with AI suggestions while staying true to your unique style.
Since I tried Ludwig back in 2017, I have been constantly using it in both editing and translation. Ever since, I suggest it to my translators at ProSciEditing.
Justyna Jupowicz-Kozak
CEO of Professional Science Editing for Scientists @ prosciediting.com