Security of Dedicated Mobile Communications for Railway
暂无分享,去创建一个
Hao Wu | Zhangdui Zhong | Gang Zhu | Bo Ai | Lei Xiong | Fanggang Wang | Lei Lei | Jianwen Ding | Ke Guan | Ruisi He
[1] Ahmad-Reza Sadeghi,et al. Mobile Trusted Computing , 2014, Proceedings of the IEEE.
[2] Gu Yonghao,et al. Research and Improvement on Security of GSM-R System , 2009 .
[3] Zheng Yu. Trusted Computing Based User Authentication for Mobile Equipment , 2006 .
[4] David Pollino,et al. Wireless security , 2002 .
[5] Chen Xi,et al. A GSM/UMTS Selective Jamming System , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[6] Russell Dean Vines. Wireless Security Essentials: Defending Mobile Systems from Data Piracy , 2002 .
[7] Hao Wu,et al. One type of GSM-R fast handover algorithm for high-speed railway , 2008 .
[8] David Pollino. Feature: How To Secure An Office Wireless Network , 2002 .
[9] Yuguang Fang,et al. Security analysis and enhancements of 3GPP authentication and key agreement protocol , 2005, IEEE Trans. Wirel. Commun..
[10] Nidal F. Shilbayeh,et al. Cloning SIM Cards Usability Reduction in Mobile Networks , 2013, Journal of Network and Systems Management.
[11] Gerald Madlmayr. A mobile trusted computing architecture for a near field communication ecosystem , 2008, iiWAS.
[12] Hugo Krawczyk,et al. UMAC: Fast and Secure Message Authentication , 1999, CRYPTO.