1. The UTMS Forum, Mobile Evolution — Shaping the future (August 1, 2003);
http://www.umts-forum.org/servlet/dycon/ztumts/umts/Live/en/umts/MultiMedia_PDFs_Papers_Paper-l-August-2003.pdf
.
2. British Transport Police, Mobile phone theft (August 20, 2006);
http://www.btp.police.uk/issues/mobile.htm
.
3. R. Lemos, Passwords: The Weakest Link? Hackers can crack most in less than a minute, CNET.com, (2002),
http://www.news.com.com/2009-1001-916719.html
.
4. N. Clarke, S.M. Furnell, P.M. Rodwell, P.L. Reynolds, Acceptance of subscriber authentication method for mobile telephony devices, Computers & Security, 21(3), pp220–228, 2002.
5. Pointsec, IT professionals turn blind eye to mobile security as survey reveals sloppy handheld habits (November 17, 2005);
http://www.pointsec.com/news/release.cfm?PressId=108
.