A survey of threats and security measures for data transmission over GSM/UMTS networks
暂无分享,去创建一个
[1] Frank Swiderski,et al. Threat Modeling , 2018, Hacking Connected Cars.
[2] Rajeev Shorey,et al. Mobile, Wireless and Sensor Networks: Technology, Applications and Future Directions , 2005 .
[3] Farnam Jahanian,et al. When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments , 2010, HotMobile '10.
[4] Tobias Martin,et al. Security Mechanisms in UMTS , 2001, Datenschutz und Datensicherheit.
[5] Lei Liu,et al. Exploitation and threat analysis of open mobile devices , 2009, ANCS '09.
[6] Ulrike Meyer,et al. A man-in-the-middle attack on UMTS , 2004, WiSe '04.
[7] Thomas Peltier,et al. Information Security Risk Analysis: A Pedagogic Model Based on a Teaching Hospital , 2006 .
[8] Safwan El Assad,et al. UMTS security: Enhancement of identification, authentication and key agreement protocols , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[9] Martin Raepple. Sicherheitskonzepte für das Internet - Grundlagen, Technologien und Lösungskonzepte für die kommerzielle Nutzung , 1998 .
[10] Sebastian Frosch,et al. Maßnahmen zur Sicherung von Datenübertragungen in GSM-/UMTS-Mobilfunknetzen , 2011 .
[11] A. Bais,et al. Evaluation of UMTS security architecture and services , 2006, 2006 4th IEEE International Conference on Industrial Informatics.
[12] Ronald D. Williams,et al. Taxonomies of attacks and vulnerabilities in computer systems , 2008, IEEE Communications Surveys & Tutorials.
[13] Felix C. Freiling,et al. Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices , 2011, 2011 IEEE Symposium on Security and Privacy.
[14] Jie Wang. Computer Network Security: Theory and Practice , 2008 .
[15] Vladimir Cretu,et al. Threats and Countermeasures in GSM Networks , 2006, J. Networks.