메뉴 건너뛰기




Volumn 5576 LNCS, Issue , 2009, Pages 280-289

Signaling-oriented DoS attacks in UMTS networks

Author keywords

Denial of Service; Security; Signaling; UMTS

Indexed keywords

DENIAL OF SERVICE; DENIAL OF SERVICE ATTACKS; DOS ATTACKS; MALICIOUS ENTITY; PUBLIC ACCEPTANCE; SECURITY; SECURITY BREACHES; THIRD GENERATION (3G) MOBILE; UMTS; UMTS NETWORKS; UNIVERSAL MOBILE TELECOMMUNICATION STANDARDS;

EID: 70350650693     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-02617-1_29     Document Type: Conference Paper
Times cited : (11)

References (15)
  • 1
    • 70350687679 scopus 로고    scopus 로고
    • 3GPP Organization, accessed, 13/01/2008
    • 3GPP Organization, http://www.3gpp.org/ (accessed, 13/01/2008)
  • 2
    • 70350631415 scopus 로고    scopus 로고
    • 3rd Generation Partnership Project 2, 3GPP2, http://www.3gpp2.org/
    • 3rd Generation Partnership Project 2, 3GPP2, http://www.3gpp2.org/
  • 5
    • 11244304396 scopus 로고    scopus 로고
    • Meyer, U., Wetzel, S.: A Man-in-the-Middle Attack on UMTS. In: WiSe 2004, Philadelphia, Pennsylvania, USA, October 1 (2004)
    • Meyer, U., Wetzel, S.: A Man-in-the-Middle Attack on UMTS. In: WiSe 2004, Philadelphia, Pennsylvania, USA, October 1 (2004)
  • 8
    • 70350701064 scopus 로고    scopus 로고
    • ETSI TS 133 102 Security architecture December 2006
    • ETSI TS 133 102 Security architecture (December 2006)
  • 9
    • 1842744024 scopus 로고    scopus 로고
    • Information Technology; Security Techniques; Entity Authentication Part 4: Mechanisms using a cryptographic check function
    • ISO/IEC 9798-4
    • ISO/IEC 9798-4. Information Technology; Security Techniques; Entity Authentication Part 4: Mechanisms using a cryptographic check function (1999)
    • (1999)
  • 11
    • 70350692623 scopus 로고    scopus 로고
    • 3GPP TR 33.900 (1.2.0, A Guide to 3G Security January 2000
    • 3GPP TR 33.900 (1.2.0), A Guide to 3G Security (January 2000)
  • 12
    • 25644445353 scopus 로고    scopus 로고
    • The design and implementation of network puzzles
    • Feng, W., Kaiser, E., Feng, W., Luu, A.: The design and implementation of network puzzles. In: Proc. INFOCOM (2005)
    • (2005) Proc. INFOCOM
    • Feng, W.1    Kaiser, E.2    Feng, W.3    Luu, A.4
  • 13
    • 33645692419 scopus 로고    scopus 로고
    • Guaranteeing access in spite of service-flooding attacks
    • Christianson, B, Crispo, B, Malcolm, J.A, Roe, M, eds, Security Protocols 2003, Springer, Heidelberg
    • Gligor, V.: Guaranteeing access in spite of service-flooding attacks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol. 3364, pp. 80-96. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3364 , pp. 80-96
    • Gligor, V.1
  • 14
    • 0038825046 scopus 로고    scopus 로고
    • Defending against denial-of-service attacks with puzzle auctions
    • Wang, X., Reiter, M.: Defending against denial-of-service attacks with puzzle auctions. In: Proc. IEEE Security and Privacy, pp. 78-92 (2003)
    • (2003) Proc. IEEE Security and Privacy , pp. 78-92
    • Wang, X.1    Reiter, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.