-
1
-
-
70350687679
-
-
3GPP Organization, accessed, 13/01/2008
-
3GPP Organization, http://www.3gpp.org/ (accessed, 13/01/2008)
-
-
-
-
2
-
-
70350631415
-
-
3rd Generation Partnership Project 2, 3GPP2, http://www.3gpp2.org/
-
3rd Generation Partnership Project 2, 3GPP2, http://www.3gpp2.org/
-
-
-
-
5
-
-
11244304396
-
-
Meyer, U., Wetzel, S.: A Man-in-the-Middle Attack on UMTS. In: WiSe 2004, Philadelphia, Pennsylvania, USA, October 1 (2004)
-
Meyer, U., Wetzel, S.: A Man-in-the-Middle Attack on UMTS. In: WiSe 2004, Philadelphia, Pennsylvania, USA, October 1 (2004)
-
-
-
-
6
-
-
20844442672
-
One-Pass GPRS and IMS Authentication Procedure for UMTS
-
June
-
Lin, Y.-B., Chang, M.-F., Hsu, M.-T., Wu, L.-Y.: One-Pass GPRS and IMS Authentication Procedure for UMTS. IEEE Journal on selected areas in communications 23(6) (June 2005)
-
(2005)
IEEE Journal on selected areas in communications
, vol.23
, Issue.6
-
-
Lin, Y.-B.1
Chang, M.-F.2
Hsu, M.-T.3
Wu, L.-Y.4
-
8
-
-
70350701064
-
-
ETSI TS 133 102 Security architecture December 2006
-
ETSI TS 133 102 Security architecture (December 2006)
-
-
-
-
9
-
-
1842744024
-
Information Technology; Security Techniques; Entity Authentication Part 4: Mechanisms using a cryptographic check function
-
ISO/IEC 9798-4
-
ISO/IEC 9798-4. Information Technology; Security Techniques; Entity Authentication Part 4: Mechanisms using a cryptographic check function (1999)
-
(1999)
-
-
-
10
-
-
57749208412
-
Vulnerabilities of UMTS Access Domain Security Architecture
-
Phuket, Thailand August
-
Khan, M., Ahmed, A., Cheema, A.R.: Vulnerabilities of UMTS Access Domain Security Architecture. In: 9th ACIS International Conference on Software Engineering, Networking, and Parallel/Distributed Computing, Phuket, Thailand (August 2008)
-
(2008)
9th ACIS International Conference on Software Engineering, Networking, and Parallel/Distributed Computing
-
-
Khan, M.1
Ahmed, A.2
Cheema, A.R.3
-
11
-
-
70350692623
-
-
3GPP TR 33.900 (1.2.0, A Guide to 3G Security January 2000
-
3GPP TR 33.900 (1.2.0), A Guide to 3G Security (January 2000)
-
-
-
-
12
-
-
25644445353
-
The design and implementation of network puzzles
-
Feng, W., Kaiser, E., Feng, W., Luu, A.: The design and implementation of network puzzles. In: Proc. INFOCOM (2005)
-
(2005)
Proc. INFOCOM
-
-
Feng, W.1
Kaiser, E.2
Feng, W.3
Luu, A.4
-
13
-
-
33645692419
-
Guaranteeing access in spite of service-flooding attacks
-
Christianson, B, Crispo, B, Malcolm, J.A, Roe, M, eds, Security Protocols 2003, Springer, Heidelberg
-
Gligor, V.: Guaranteeing access in spite of service-flooding attacks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol. 3364, pp. 80-96. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3364
, pp. 80-96
-
-
Gligor, V.1
-
14
-
-
0038825046
-
Defending against denial-of-service attacks with puzzle auctions
-
Wang, X., Reiter, M.: Defending against denial-of-service attacks with puzzle auctions. In: Proc. IEEE Security and Privacy, pp. 78-92 (2003)
-
(2003)
Proc. IEEE Security and Privacy
, pp. 78-92
-
-
Wang, X.1
Reiter, M.2
-
15
-
-
14844300104
-
New client puzzle outsourcing techniques for DoS resistance
-
Waters, B., Juels, A., Halderman, J., Felten, E.: New client puzzle outsourcing techniques for DoS resistance. In: Proc. Computer and Communications Security, pp. 246-256 (2004)
-
(2004)
Proc. Computer and Communications Security
, pp. 246-256
-
-
Waters, B.1
Juels, A.2
Halderman, J.3
Felten, E.4
|