-
1
-
-
78649952291
-
Security and Denial of Service Threats in GSM Networks. Periodica Politechnica
-
ISSN 1224-600X
-
Bocan, V., Cretu, V.: Security and Denial of Service Threats in GSM Networks. Periodica Politechnica, Transactions on Automatic Control and Computer Science 49(63) (2004) ISSN 1224-600X
-
(2004)
Transactions on Automatic Control and Computer Science
, vol.49
, Issue.63
-
-
Bocan, V.1
Cretu, V.2
-
2
-
-
70350763926
-
Exploiting Open Functionality in SMS-Capable Cellular Networks
-
Alexandria, VA, USA, November, 2005
-
Enck, W., Traynor, P., McDaniel, P., La Porta, T.: Exploiting Open Functionality in SMS-Capable Cellular Networks. In: Proc. of CCS 2005, Alexandria, VA, USA, November 2005, pp. 7-11 (2005)
-
(2005)
Proc. of CCS
, pp. 7-11
-
-
Enck, W.1
Traynor, P.2
McDaniel, P.3
La Porta, T.4
-
3
-
-
24944538070
-
Security Threats and Their Countermeasures of Mobile Portable Computing Devices in Ubiquitous Computing Environments
-
Gervasi, O, Gavrilova, M.L, Kumar, V, Laganá, A, Lee, H.P, Mun, Y, Taniar, D, Tan, C.J.K, eds, ICCSA 2005, Springer, Heidelberg
-
Kim, S.h., Leem, C.S.: Security Threats and Their Countermeasures of Mobile Portable Computing Devices in Ubiquitous Computing Environments. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3483, pp. 79-85. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3483
, pp. 79-85
-
-
Kim, S.H.1
Leem, C.S.2
-
4
-
-
28244472716
-
E-mail Authentication Is Here, but Has It Arrived Yet?
-
Lawton, G.: E-mail Authentication Is Here, but Has It Arrived Yet? IEEE Computer 38(11), 17-19 (2005)
-
(2005)
IEEE Computer
, vol.38
, Issue.11
, pp. 17-19
-
-
Lawton, G.1
-
5
-
-
0033720074
-
The Global System for Mobile Communications Short Message Service
-
Peersman, G., Cvetkovic, S., Griffiths, P., Spear, H.: The Global System for Mobile Communications Short Message Service. IEEE Personal Communications, 15-23 (2000)
-
(2000)
IEEE Personal Communications
, vol.15-23
-
-
Peersman, G.1
Cvetkovic, S.2
Griffiths, P.3
Spear, H.4
-
6
-
-
13444260080
-
Consumer-Perceived Risk in E-Commerce Transactions
-
Salam, A.F., Rao, H.R., Pegels, C.C.: Consumer-Perceived Risk in E-Commerce Transactions. Comm. of the ACM 46(12), 325-331 (2003)
-
(2003)
Comm. of the ACM
, vol.46
, Issue.12
, pp. 325-331
-
-
Salam, A.F.1
Rao, H.R.2
Pegels, C.C.3
-
7
-
-
54249156151
-
Telelogin: A Two-factor Two-path Authentication Technique Using Caller ID, NTT Information Sharing Platform Laboratories
-
August
-
Fujii, H., Shigematsu, N., Kurokawa, H., Nakagawa, T.: Telelogin: a Two-factor Two-path Authentication Technique Using Caller ID, NTT Information Sharing Platform Laboratories, NTT Technical Review, Vol. 6(8) (August 2008), https:// www.ntt-review.jp/archive/ntttechnical.php?contents=ntr200808le3.html
-
(2008)
NTT Technical Review
, vol.6
, Issue.8
-
-
Fujii, H.1
Shigematsu, N.2
Kurokawa, H.3
Nakagawa, T.4
-
8
-
-
23344447680
-
Why Spyware Poses Multiple Threats to Security?
-
Thompson, R.: Why Spyware Poses Multiple Threats to Security? Communications of the ACM 48(8), 41-43 (2005)
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 41-43
-
-
Thompson, R.1
-
9
-
-
67649678799
-
Providing True End-to-End Security in Converged Voice Over IP Infrastructures
-
in press, January
-
Palmieri, F., Fiore, U.: Providing True End-to-End Security in Converged Voice Over IP Infrastructures. Journal of Computer & Security (in press) (January 2009), http://dx.doi.org/10.1016/j.cose.2009.01.004
-
(2009)
Journal of Computer & Security
-
-
Palmieri, F.1
Fiore, U.2
-
10
-
-
70350754420
-
-
3rd Generation Partnership Project, Technical realization of the Short Message Service (SMS), Rel. 5.1.0, 3GPP Technical Specific Group Terminals (2001)
-
3rd Generation Partnership Project, Technical realization of the Short Message Service (SMS), Rel. 5.1.0, 3GPP Technical Specific Group Terminals (2001)
-
-
-
-
11
-
-
70350761752
-
-
Internet Protocol Telephony and Voice Over the Internet Protocol, Security Technical Implementation Guide, Defense Information Systems Agency (DISA) for the U.S. Department of Defense (DOD), Version 2, Rel. 2 (April 2006), http://iase.disa.mil/stigs/stig/VoIP-STIG-V2R2.pdf
-
Internet Protocol Telephony and Voice Over the Internet Protocol, Security Technical Implementation Guide, Defense Information Systems Agency (DISA) for the U.S. Department of Defense (DOD), Version 2, Rel. 2 (April 2006), http://iase.disa.mil/stigs/stig/VoIP-STIG-V2R2.pdf
-
-
-
-
13
-
-
70350761755
-
-
Caller ID spoofing with PHP and asterisk (last updated 14 February 2006), http:// www.nata2.org/2006/02/14/caller-id-spoofing-with-php-and-asterisk/
-
Caller ID spoofing with PHP and asterisk (last updated 14 February 2006), http:// www.nata2.org/2006/02/14/caller-id-spoofing-with-php-and-asterisk/
-
-
-
-
14
-
-
70350774137
-
-
The definitive resource on Caller ID spoofing (last updated, 20 February 2009), http://www.calleridspoofing.info/
-
The definitive resource on Caller ID spoofing (last updated, 20 February 2009), http://www.calleridspoofing.info/
-
-
-
-
15
-
-
70350786472
-
-
Running your own GSM network, 25th Chaos Communication Congress (last updated, 29 December 2008), http://events.ccc.de/congress/2008/Fahrplan/events/ 3007.en.html
-
Running your own GSM network, 25th Chaos Communication Congress (last updated, 29 December 2008), http://events.ccc.de/congress/2008/Fahrplan/events/ 3007.en.html
-
-
-
-
17
-
-
70350746266
-
-
SMiShing: SMs phISHING, Wikipedia, the free encyclopedia (last updated, 1 May 2009), http://en.wikipedia.org/wiki/SMiShing
-
SMiShing: SMs phISHING, Wikipedia, the free encyclopedia (last updated, 1 May 2009), http://en.wikipedia.org/wiki/SMiShing
-
-
-
-
18
-
-
84883036547
-
SPEECH: Secure Personal End-to-End Communication with Handheld
-
Europe, October, Vieweg Verlag
-
Castiglione, A., Cattaneo, G., De Santis, A., Petagna, F., Ferraro Petrillo, U.: SPEECH: Secure Personal End-to-End Communication with Handheld. In: Proc. of ISSE 2006, Securing Electronic Business Processes (Information Security Solutions Europe), October 2006, pp. 287-297. Vieweg Verlag (2006)
-
(2006)
Proc. of ISSE 2006, Securing Electronic Business Processes (Information Security Solutions
, pp. 287-297
-
-
Castiglione, A.1
Cattaneo, G.2
De Santis, A.3
Petagna, F.4
Ferraro Petrillo, U.5
-
19
-
-
65249112049
-
A New Era of Presidential Security: The President and His BlackBerry
-
Harauz, J., Kaufman, L.M.: A New Era of Presidential Security: The President and His BlackBerry. IEEE Security & Privacy 7(2), 67-70 (2009)
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.2
, pp. 67-70
-
-
Harauz, J.1
Kaufman, L.M.2
-
20
-
-
70350755675
-
-
Jailbreak (iPhone), Wikipedia, the free encyclopedia (last updated 29 April 2009), http://en.wikipedia.org/wiki/Jailbreak-(iPhone)
-
Jailbreak (iPhone), Wikipedia, the free encyclopedia (last updated 29 April 2009), http://en.wikipedia.org/wiki/Jailbreak-(iPhone)
-
-
-
-
21
-
-
77952715421
-
An Extensible Framework for Efficient Secure SMS
-
Technical Report, University of Salerno
-
Castiglione, A., Cattaneo, G., Cembalo, M., De Santis, A., Petagna, F., Ferraro Petrillo, U.: An Extensible Framework for Efficient Secure SMS". Technical Report - University of Salerno
-
-
-
Castiglione, A.1
Cattaneo, G.2
Cembalo, M.3
De Santis, A.4
Petagna, F.5
Ferraro Petrillo, U.6
|