Solutions to the GSM Security Weaknesses
暂无分享,去创建一个
[1] Chi-Chun Lo,et al. Secure communication mechanisms for GSM networks , 1999, IEEE Trans. Consumer Electron..
[2] Vladimir Cretu,et al. Mitigating denial of service threats in GSM networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[3] Valtteri Niemi,et al. UMTS security , 2003 .
[4] Praphul Chandra. BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering) , 2005 .
[5] Pankaj Rohatgi,et al. Partitioning attacks: or how to rapidly clone some GSM cards , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[6] Wolfgang Rankl,et al. Smart Card Handbook , 1997 .
[7] A.B. Rekha,et al. End-to-end security for GSM users [speech coding method] , 2005, 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005..
[8] Ahmet Kondoz,et al. Real time data transmission over GSM voice channel for secure voice and data applications , 2004 .
[9] Ahmet M. Kondoz,et al. Real-time end-to-end secure voice communications over GSM voice channel , 2005, 2005 13th European Signal Processing Conference.
[10] Tyler Moore,et al. Securing SS7 Telecommunications Networks , 2001 .
[11] S.M. Siddique,et al. Notice of Violation of IEEE Publication PrinciplesGSM Security Issues and Challenges , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).
[12] Francisco Javier González-Castaño,et al. Real-time interception systems for the GSM protocol , 2002, IEEE Trans. Veh. Technol..
[13] Eli Biham,et al. Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication , 2003, Journal of Cryptology.
[14] Alex Biryukov,et al. Real Time Cryptanalysis of A5/1 on a PC , 2000, FSE.