-
1
-
-
33750249661
-
-
[Internet Accessed 20 April 2003]
-
M. Walker, On the Security of 3GPP Networks. [Internet Accessed 20 April 2003] http://www.esat.kuleuven.ac.be/cosic/eurocrypt2000/mike_walker.pdf
-
On the Security of 3GPP Networks
-
-
Walker, M.1
-
3
-
-
31344443231
-
Revenue assurance, fraud and security in 3G telecom services
-
Fall
-
Mark Johnson, Revenue Assurance, Fraud and Security in 3G Telecom Services, VP Business Development Visual Wireless AB, Journal of Econoic Management, Fall 2002, Volume 1, Issue 2, www.jecm.org
-
(2002)
VP Business Development Visual Wireless AB, Journal of Econoic Management
, vol.1
, Issue.2
-
-
Johnson, M.1
-
4
-
-
0035006633
-
Towards a coherent approach to third generation system security
-
P. Howard, March
-
M. Walker, T. Wright, Towards a Coherent Approach to Third Generation System Security, P. Howard, IEEE Conference Publication, pp. 21-27, March 2001.
-
(2001)
IEEE Conference Publication
, pp. 21-27
-
-
Walker, M.1
Wright, T.2
-
5
-
-
1342282538
-
The evaluation of wireless LANs and PANs -efficient authentication and key distribution in wireless IP networks
-
December
-
L. Salgarelli, M. Buddhikot, J. Garay, S. Patel, and S. Miller., The Evaluation of wireless LANs and PANs -Efficient Authentication and Key Distribution in Wireless IP Networks, IEEE Personal Communication on Wireless Communication 10(6):52-61, December 2003.
-
(2003)
IEEE Personal Communication on Wireless Communication
, vol.10
, Issue.6
, pp. 52-61
-
-
Salgarelli, L.1
Buddhikot, M.2
Garay, J.3
Patel, S.4
Miller, S.5
-
6
-
-
0004282359
-
-
April
-
P.R. Calhoun, J. Loughney, E. Guttman, G. Zorn, and J. Arkko, Diameter Base Protocol, April 2005
-
(2005)
Diameter Base Protocol
-
-
Calhoun, P.R.1
Loughney, J.2
Guttman, E.3
Zorn, G.4
Arkko, J.5
-
7
-
-
0032312372
-
A new authentication protocol for GSM networks
-
Khalid Al-Tawil, Ali Akrami and Habib Yousef, A new Authentication Protocol for GSM Networks, Local computer Networks, LCN'98 Proceedings, 23rd Annual conference on, pp.21-30.
-
Local Computer Networks, LCN'98 Proceedings, 23rd Annual Conference on
, pp. 21-30
-
-
Al-Tawil, K.1
Akrami, A.2
Yousef, H.3
-
8
-
-
84875347025
-
An efficient authentication protocol for GSM network
-
Min Shiang Hwang, Yuan Liang Tang and Cheng-chi Lee, An Efficient Authentication Protocol for GSM Network, EUROCOMM 2000.
-
EUROCOMM 2000
-
-
Hwang, M.S.1
Tang, Y.L.2
Lee, C.-C.3
-
10
-
-
0032678890
-
Security and authentication in PCS
-
July
-
Lin H. Y., Security and Authentication in PCS, Computers & Electrical Engineering, Volume 25, No. 4, July 1999, pp. 225-248.
-
(1999)
Computers & Electrical Engineering
, vol.25
, Issue.4
, pp. 225-248
-
-
Lin, H.Y.1
-
11
-
-
33751252045
-
-
[Interned Accessed 22 Sept 2005]
-
Ari Vesanen, Cellular Telephone Network security, [Interned Accessed 22 Sept 2005] www.adela.karlin.mff.cuni.cz/l1/~tuma/nciphers/CELL_ SEC_E.ppt
-
Cellular Telephone Network Security
-
-
Vesanen, A.1
-
12
-
-
33751213463
-
-
3G TS 33.102: 3G security; Security Architecture
-
3G TS 33.102: 3G security; Security Architecture, http://www.ets.org
-
-
-
-
13
-
-
33751223269
-
-
[Internet accessed 05-oct-2005]
-
http://en.wikipedia.prg/wiki/Replay_attack. [Internet accessed 05-oct-2005].
-
-
-
-
15
-
-
0036014438
-
A lightweight reconfigurable security mechanism for 3G/4G mobile
-
April 2002
-
J. Al-Muhtadi, D. Mickunas, & R. Campbell, A Lightweight Reconfigurable Security Mechanism for 3G/4G Mobile, IEEE Wireless Communications, Vol. 9 (2002) pp. 60-65, April 2002.
-
(2002)
IEEE Wireless Communications
, vol.9
, pp. 60-65
-
-
Al-Muhtadi, J.1
Mickunas, D.2
Campbell, R.3
|