-
1
-
-
55949084240
-
Integrity codes: Message integrity protection and authentication over insecure channels
-
Oct.-Dec.
-
S. Capkun, M. Cagalj, R. Rengaswamy, I. Tsigkogiannis, J.-P. Hubaux, and M. Srivastava, "Integrity codes: Message integrity protection and authentication over insecure channels," IEEE Trans. Dependable Secure Comput., vol. 5, no. 4, pp. 208-223, Oct.-Dec. 2008.
-
(2008)
IEEE Trans. Dependable Secure Comput.
, vol.5
, Issue.4
, pp. 208-223
-
-
Capkun, S.1
Cagalj, M.2
Rengaswamy, R.3
Tsigkogiannis, I.4
Hubaux, J.-P.5
Srivastava, M.6
-
2
-
-
84880615912
-
A secure communication over wireless environments by using a data connection core
-
Y.-L. Huang, F.-Y. Leu, and K.-C. Wei, "A secure communication over wireless environments by using a data connection core," Math. Comput. Modelling, vol. 58, no. 5, pp. 1459-1474, 2013.
-
(2013)
Math. Comput. Modelling
, vol.58
, Issue.5
, pp. 1459-1474
-
-
Huang, Y.-L.1
Leu, F.-Y.2
Wei, K.-C.3
-
3
-
-
84883036547
-
SPEECH: Secure personal end-to-end communication with handheld
-
Vieweg, [Online]. Available
-
A. Castiglione, G. Cattaneo, A. De Santis, F. Petagna, and U. Ferraro Petrillo. 2006. "SPEECH: Secure personal end-to-end communication with handheld," in Proc. ISSE Securing Electronic Busines Processes. Vieweg, pp. 287-297, [Online]. Available:http://dx.doi.org/10.1007/978-3-8348-9195-2-31
-
(2006)
Proc. ISSE Securing Electronic Busines Processes
, pp. 287-297
-
-
Castiglione, A.1
Cattaneo, G.2
De Santis, A.3
Petagna, F.4
Ferraro Petrillo, U.5
-
4
-
-
84896734213
-
A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment
-
Available
-
Y.-L. Huang, F.-Y. Leu, I. You, Y.-K. Sun, and C.-C. Chu. (2014). A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment. J. Supercomput. [Online]. 67(3), pp. 635-652. Available:http://dx. doi.org/10.1007/s11227-013-0958-z
-
(2014)
J. Supercomput. [Online]
, vol.67
, Issue.3
, pp. 635-652
-
-
Huang, Y.-L.1
Leu, F.-Y.2
You, I.3
Sun, Y.-K.4
Chu, C.-C.5
-
5
-
-
55949087657
-
A computationally sound mechanized prover for security protocols
-
Oct.-Dec.
-
B. Blanchet, "A computationally sound mechanized prover for security protocols," IEEE Trans. Dependable Secure Comput., vol. 5, no. 4, pp. 193-207, Oct.-Dec. 2008.
-
(2008)
IEEE Trans. Dependable Secure Comput.
, vol.5
, Issue.4
, pp. 193-207
-
-
Blanchet, B.1
-
6
-
-
74049108559
-
On cellular botNets: Measuring the impact of malicious devices on a cellular network core
-
P. Traynor, M. Lin, M. Ongtang, V. Rao, T. Jaeger, P. McDaniel, and T. La Porta, "On cellular botNets: Measuring the impact of malicious devices on a cellular network core," in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 223-234.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security
, pp. 223-234
-
-
Traynor, P.1
Lin, M.2
Ongtang, M.3
Rao, V.4
Jaeger, T.5
McDaniel, P.6
La Porta, T.7
-
9
-
-
83455168794
-
Managing threats by the use of visualisation techniques
-
V. Viduto, C. Maple, and W. Huang, "Managing threats by the use of visualisation techniques," Int. J. Space-Based Situated Comput., vol. 1, no. 2/3, pp. 204-212, 2011.
-
(2011)
Int. J. Space-Based Situated Comput.
, vol.1
, Issue.2-3
, pp. 204-212
-
-
Viduto, V.1
Maple, C.2
Huang, W.3
-
10
-
-
84888289162
-
Breaking and fixing the android launching flow
-
A. Armando, A. Merlo, M. Migliardi, and L. Verderame, "Breaking and fixing the android launching flow," Comput. Security, vol. 39, pp. 104-115, 2013.
-
(2013)
Comput. Security
, vol.39
, pp. 104-115
-
-
Armando, A.1
Merlo, A.2
Migliardi, M.3
Verderame, L.4
-
11
-
-
80052493767
-
Smartphone security evaluation - The malware attack case
-
A. Mylonas, S. Dritsas, B. Tsoumas, and D. Gritzalis, "Smartphone security evaluation - the malware attack case," in Proc. Int. Conf. Security Cryptography, 2011, pp. 25-36.
-
(2011)
Proc. Int. Conf. Security Cryptography
, pp. 25-36
-
-
Mylonas, A.1
Dritsas, S.2
Tsoumas, B.3
Gritzalis, D.4
-
13
-
-
84874837538
-
Smart-phone attacks and defenses
-
C. Guo, H. J. Wang, and W. Zhu, "Smart-phone attacks and defenses," in Proc. 3rd Workshop Hot Topics Netw., 2004, pp. 1-6.
-
Proc. 3rd Workshop Hot Topics Netw., 2004
, pp. 1-6
-
-
Guo, C.1
Wang, H.J.2
Zhu, W.3
-
14
-
-
84871061297
-
On Attack Casuality in Internet-Connected Cellular Networks
-
P. Traynor, P. McDaniel, and T. La Porta, "On Attack Casuality in Internet-Connected Cellular Networks," in Proc. 16th USENIX Security Symp., 2007, pp. 1-16.
-
Proc. 16th USENIX Security Symp., 2007
, pp. 1-16
-
-
Traynor, P.1
McDaniel, P.2
La Porta, T.3
-
16
-
-
57349123036
-
Can you infect me now?: Malware propagation in mobile phone networks
-
[Online]. Available
-
C. Fleizach, M. Liljenstam, P. Johansson, G. M. Voelker, and A. Mehes. (2007). Can you infect me now?: Malware propagation in mobile phone networks. Proc. ACM Workshop Recurring Malcode, pp. 61-68. [Online]. Available: http://doi.acm.org/10.1145/1314389.1314402
-
(2007)
Proc. ACM Workshop Recurring Malcode
, pp. 61-68
-
-
Fleizach, C.1
Liljenstam, M.2
Johansson, P.3
Voelker, G.M.4
Mehes, A.5
-
18
-
-
80755181021
-
A survey of mobile malware in the wild
-
[Online]. Available
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. (2011). A survey of mobile malware in the wild. Proc. 1st ACM Workshop Security Privacy in Smartphones Mobile Dev., pp. 3-14. [Online]. Available: http://doi.acm.org/10. 1145/2046614.2046618
-
(2011)
Proc. 1st ACM Workshop Security Privacy in Smartphones Mobile Dev.
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
19
-
-
33751040642
-
Mitigating attacks on open functionality in SMS-capable cellular networks
-
P. Traynor, W. Enck, P. McDaniel, and T. La Porta, "Mitigating attacks on open functionality in SMS-capable cellular networks," in Proc. 12th Annu. Int. Conf. Mobile Comput. Netw., 2006, pp. 182-193.
-
Proc. 12th Annu. Int. Conf. Mobile Comput. Netw., 2006
, pp. 182-193
-
-
Traynor, P.1
Enck, W.2
McDaniel, P.3
La Porta, T.4
-
20
-
-
57749208412
-
Vulnerabilities of UMTS access domain security architecture
-
M. Khan, A. Ahmed, and A. R. Cheema, "Vulnerabilities of UMTS access domain security architecture," in Proc. IEEE 9th Int. Conf. Softw. Eng., Artif. Intell., Netw. Parallel/Distrib. Comput., 2008, pp. 350-355.
-
Proc. IEEE 9th Int. Conf. Softw. Eng., Artif. Intell., Netw. Parallel/Distrib. Comput., 2008
, pp. 350-355
-
-
Khan, M.1
Ahmed, A.2
Cheema, A.R.3
-
21
-
-
70350650693
-
Signaling-oriented DoS attacks in UMTS networks
-
G. Kambourakis, C. Kolias, S. Gritzalis, and J. Hyuk-Park, "Signaling-oriented DoS attacks in UMTS networks," in Proc. 3rd Int. Conf. Workshops Adv. Inform. Security Assurance, 2009, pp. 280-289.
-
Proc. 3rd Int. Conf. Workshops Adv. Inform. Security Assurance, 2009
, pp. 280-289
-
-
Kambourakis, G.1
Kolias, C.2
Gritzalis, S.3
Hyuk-Park, J.4
-
22
-
-
84892873906
-
A denial of service attack to GSM networks via attach procedure
-
[Online]. Available
-
N. Gobbo, A. Merlo, and M. Migliardi. (2013). A denial of service attack to GSM networks via attach procedure, Proc. ARES Workshop, vol. 8128, pp. 361-376, [Online]. Available:http://dx.doi.org/10.1007/978-3-642-40588-4-25
-
(2013)
Proc. ARES Workshop
, vol.8128
, pp. 361-376
-
-
Gobbo, N.1
Merlo, A.2
Migliardi, M.3
-
23
-
-
84904004583
-
-
3GPP, [Online]. Available
-
3GPP, (2012). TS 25.214 - Physical layer procedures (FDD). [Online]. Available: http://www.3gpp.org/ftp/Specs/html-info/25214.htm
-
(2012)
TS 25.214 - Physical Layer Procedures (FDD)
-
-
-
26
-
-
30744446215
-
Connection setup delay for packet switched services
-
C. Johnson, H. Holma, and I. Sharp, "Connection setup delay for packet switched services," in Proc. 6th IEEE Int. Conf. 3G Beyond, 2005, pp. 1-5.
-
Proc. 6th IEEE Int. Conf. 3G Beyond, 2005
, pp. 1-5
-
-
Johnson, C.1
Holma, H.2
Sharp, I.3
|