-
1
-
-
84944107699
-
-
3GPP TS 33.102 V3.11.0, “Security Architecture”, 3rd Generation Partnership Project, Technical Specification Group, 3G Security, Valbonne, France
-
GPP TS 33.102 V3.11.0, “Security Architecture”, 3rd Generation Partnership Project, Technical Specification Group, 3G Security, Valbonne, France, 2002, http://www.3gpp.org/ftp/Specs/2002-03/R1999/33_series/33102-3b0.zip.
-
(2002)
-
-
-
2
-
-
33845570213
-
-
preliminary draft, December 1999. 4 PANA is acronym for “Protocol for carrying Authentication for Network Access”. See more details in the PANA workgroup link, 5 AAA is acronym for Authentication, Authorization and Accounting
-
A. BIRYUKOV, A. SHAMIR, “Real time cryptanalysis of the alleged A5/1 on a PC”, preliminary draft, December 1999. 4 PANA is acronym for “Protocol for carrying Authentication for Network Access”. See more details in the PANA workgroup link: http://www.ietf.org/html.charters/pana-charter.html. 5 AAA is acronym for Authentication, Authorization and Accounting.
-
Real Time Cryptanalysis of the Alleged A5/1 on a PC
-
-
Biryukov, A.1
Shamir, A.2
-
3
-
-
33845570213
-
Real time cryptanalysis of A5/1 on a PC
-
Springer Verlag, Berlin
-
A. BIRYUKOV, A. SHAMIR, D. WAGNER, “Real time cryptanalysis of A5/1 on a PC”, in FSE 2000, LNCS No. 1978, Springer Verlag, Berlin, 2000.
-
(2000)
FSE 2000, LNCS No. 1978
-
-
Biryukov, A.1
Shamir, A.2
Wagner, D.3
-
6
-
-
33845568186
-
-
lecture notes, Royal Holloway, University of London, 19 Nov 2001
-
P. HOWARD, “GSM and 3G Security”, lecture notes, Royal Holloway, University of London, 19 Nov 2001, http://www.isg.rhbnc.ac.uk/msc/teaching/is3/is3.shtml.
-
GSM and 3G Security
-
-
Howard, P.1
-
10
-
-
84948430459
-
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards, IBM Watson Research Center
-
Oakland, CA, May
-
J. R. RAO, P. ROHATGI and H. SCHERZER, “Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards”, IBM Watson Research Center, in 2002 IEEE Symposium on Security and Privacy, Oakland, CA, May 2002.
-
(2002)
2002 IEEE Symposium on Security and Privacy
-
-
Rao, J.R.1
Rohatgi, P.2
Scherzer, H.3
-
11
-
-
84944030081
-
SHAMAN Deliverable D02 – Intermediate Report: Results of review, Requirements and reference Architecture
-
November
-
R. SCHMITZ, “SHAMAN Deliverable D02 – Intermediate Report: Results of review, Requirements and reference Architecture”, Information Society Technologies, 08 November 2001, pp. 41-42.
-
(2001)
Information Society Technologies
, vol.8
, pp. 41-42
-
-
Schmitz, R.1
-
12
-
-
4544341158
-
Optical Fault Induction Attacks, University of Cambridge
-
Oakland, May
-
S. SKOROBOGATOV, R. ANDERSON, “Optical Fault Induction Attacks”, University of Cambridge, in 2002 IEEE Symposium on Security and Privacy, Oakland, May 2002.
-
(2002)
2002 IEEE Symposium on Security and Privacy
-
-
Skorobogatov, S.1
Anderson, R.2
-
13
-
-
0013228462
-
Security
-
F. Hillebrand, editor, John Wiley & Sons, New York
-
M. WALKER and T. WRIGHT, “Security”, in F. Hillebrand, editor, GSM and UMTS: The Creation of Global Mobile Communication, pp. 385-406, John Wiley & Sons, New York, 2002.
-
(2002)
GSM and UMTS: The Creation of Global Mobile Communication
, pp. 385-406
-
-
Walker, M.1
Wright, T.2
|