authentication

Blog Thumbnail Image

Comparing 4G and 5G Authentication: What You Need to Know and Why

February 6, 2019

The 5G (fifth generation) of cellular mobile communication is among the hottest technologies today and is under development by 3GPP. Besides providing faster speed, higher bandwidth, and lower latency, 5G also supports more use cases, such as: Enhanced Mobile Broadband (eMBB) Massive Machine Type Communications (mMTC) Ultra Reliable Low Latency Communications (uRLLC) With global deployment […]

Read More
Blog Thumbnail Image

Adversarial Engineering

July 13, 2016

Security engineering is one of few technical endeavors in which you deal with an adversary. There are a few other domains such as electronic warfare or fire prevention. Working against an adversary in this way is like playing a twisted game of chess. As the game begins, the security engineer is aware of most of […]

Read More