Telecommunication Network Security

[1]  Christopher Hadnagy,et al.  Social Engineering: The Art of Human Hacking , 2010 .

[2]  Bruce Schneier,et al.  Cryptography Engineering - Design Principles and Practical Applications , 2010 .

[3]  Indrakshi Ray,et al.  Towards a location-based mandatory access control model , 2006, Comput. Secur..

[4]  Johnny Long,et al.  No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing , 2008 .

[5]  Man Young Rhee Cryptography and Secure Communications , 1993 .

[6]  Christopher Swenson,et al.  Modern cryptanalysis - techniques for advanced code breaking , 2008 .

[7]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[8]  Dale K. Pace,et al.  The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1998 .

[9]  Dennis Willetts Telecommunications security , 1992 .

[10]  Gabriele Lenzini,et al.  Trust-enhanced Security in Location-based Adaptive Authentication , 2008, Electron. Notes Theor. Comput. Sci..

[11]  Thomas F. La Porta,et al.  Security for Telecommunications Networks , 2008, Advances in Information Security.

[12]  Jochen Schiller,et al.  Location Based Services , 2004 .

[13]  Tony Bradley,et al.  Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security , 2006 .

[14]  M. Angela Sasse,et al.  Users are not the enemy , 1999, CACM.

[15]  Edward F. Gehringer Choosing passwords: security and human factors , 2002, IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293).

[16]  Bruce Schneier,et al.  Beyond fear - thinking sensibly about security in an uncertain world , 2003 .

[17]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[18]  Roger J. Sutton Secure Communications: Applications and Management , 2002 .

[19]  Warren G. Kruse,et al.  Computer Forensics: Incident Response Essentials , 2001 .

[20]  M. Adeka,et al.  Resolving the password security purgatory in the contexts of technology, security and human factors , 2013, 2013 International Conference on Computer Applications Technology (ICCAT).

[21]  Bruce Schneier,et al.  Secrets and Lies: Digital Security in a Networked World , 2000 .