User Privacy, Identity and Trust in 5G | part of A Comprehensive Guide to 5G Security | Wiley Telecom books | IEEE Xplore