메뉴 건너뛰기




Volumn 2437, Issue , 2002, Pages 129-144

A contemporary foreword on GSM security

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; NETWORK SECURITY;

EID: 84944034370     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45831-x_10     Document Type: Conference Paper
Times cited : (19)

References (13)
  • 1
    • 84944107699 scopus 로고    scopus 로고
    • 3GPP TS 33.102 V3.11.0, “Security Architecture”, 3rd Generation Partnership Project, Technical Specification Group, 3G Security, Valbonne, France
    • GPP TS 33.102 V3.11.0, “Security Architecture”, 3rd Generation Partnership Project, Technical Specification Group, 3G Security, Valbonne, France, 2002, http://www.3gpp.org/ftp/Specs/2002-03/R1999/33_series/33102-3b0.zip.
    • (2002)
  • 2
    • 33845570213 scopus 로고    scopus 로고
    • preliminary draft, December 1999. 4 PANA is acronym for “Protocol for carrying Authentication for Network Access”. See more details in the PANA workgroup link, 5 AAA is acronym for Authentication, Authorization and Accounting
    • A. BIRYUKOV, A. SHAMIR, “Real time cryptanalysis of the alleged A5/1 on a PC”, preliminary draft, December 1999. 4 PANA is acronym for “Protocol for carrying Authentication for Network Access”. See more details in the PANA workgroup link: http://www.ietf.org/html.charters/pana-charter.html. 5 AAA is acronym for Authentication, Authorization and Accounting.
    • Real Time Cryptanalysis of the Alleged A5/1 on a PC
    • Biryukov, A.1    Shamir, A.2
  • 3
    • 33845570213 scopus 로고    scopus 로고
    • Real time cryptanalysis of A5/1 on a PC
    • Springer Verlag, Berlin
    • A. BIRYUKOV, A. SHAMIR, D. WAGNER, “Real time cryptanalysis of A5/1 on a PC”, in FSE 2000, LNCS No. 1978, Springer Verlag, Berlin, 2000.
    • (2000) FSE 2000, LNCS No. 1978
    • Biryukov, A.1    Shamir, A.2    Wagner, D.3
  • 6
    • 33845568186 scopus 로고    scopus 로고
    • lecture notes, Royal Holloway, University of London, 19 Nov 2001
    • P. HOWARD, “GSM and 3G Security”, lecture notes, Royal Holloway, University of London, 19 Nov 2001, http://www.isg.rhbnc.ac.uk/msc/teaching/is3/is3.shtml.
    • GSM and 3G Security
    • Howard, P.1
  • 10
    • 84948430459 scopus 로고    scopus 로고
    • Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards, IBM Watson Research Center
    • Oakland, CA, May
    • J. R. RAO, P. ROHATGI and H. SCHERZER, “Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards”, IBM Watson Research Center, in 2002 IEEE Symposium on Security and Privacy, Oakland, CA, May 2002.
    • (2002) 2002 IEEE Symposium on Security and Privacy
    • Rao, J.R.1    Rohatgi, P.2    Scherzer, H.3
  • 11
    • 84944030081 scopus 로고    scopus 로고
    • SHAMAN Deliverable D02 – Intermediate Report: Results of review, Requirements and reference Architecture
    • November
    • R. SCHMITZ, “SHAMAN Deliverable D02 – Intermediate Report: Results of review, Requirements and reference Architecture”, Information Society Technologies, 08 November 2001, pp. 41-42.
    • (2001) Information Society Technologies , vol.8 , pp. 41-42
    • Schmitz, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.