Rogue femtocell owners: How Mallory can monitor my devices
暂无分享,去创建一个
[1] Jean-Pierre Seifert,et al. Security analysis of a femtocell device , 2011, SIN '11.
[2] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[3] Fabrizio Granelli,et al. Energino: A hardware and software solution for energy consumption monitoring , 2012, 2012 10th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).
[4] Steve Gold. Cracking cellular networks via femtocells , 2011, Netw. Secur..
[5] Charles V. Wright,et al. Uncovering Spoken Phrases in Encrypted Voice over IP Conversations , 2010, TSEC.
[6] Douglas N. Knisely,et al. Standardization of femtocells in 3GPP2 , 2009, IEEE Communications Magazine.
[7] Roberto Riggio,et al. A measurement-based model of energy consumption in femtocells , 2012, 2012 IFIP Wireless Days.
[8] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[9] Jean-Pierre Hubaux,et al. Security Issues in Next Generation Mobile Networks: LTE and Femtocells , 2010 .
[10] Douglas N. Knisely,et al. Standardization of femtocells in 3GPP , 2009, IEEE Communications Magazine.
[11] M. Al-Qutayri,et al. Deployment challenges of femtocells in future indoor wireless networks , 2011, 2011 IEEE GCC Conference and Exhibition (GCC).
[12] Kjell Jørgen Hole,et al. Securing Wi-Fi Networks , 2005, Computer.
[13] Hyoung-Kee Choi,et al. Building Femtocell More Secure with Improved Proxy Signature , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[14] Ravishankar Borgaonkar,et al. Femtocells: a Poisonous Needle in the Operator's Hay Stack , 2011 .