1. 3rd Generation Partnership Project: Technical Specification Group SA: 3G Security, Security Architecture, Version 4.2.0 released 4, 3GPP, TS 33.102.2001.
2. AL-Tawil, K., Akram, A., & Youssef, H. (1998). A new authentication protocol for GSM networks. In Proceedings of the IEEE 23rd annual conference on local computer networks (LCN’98)199821–30.
3. Ammayappan, K., Saxena, A., & Negi, A. (2006). Mutual authentication and key agreement based on elliptic curve cryptography for GSM. ADCOM, 2006, 183–187.
4. Biryukov, A., Shamir, A., & Wagner, D. (2001). Real time cryptanalysis of (A5/1) on (PC), LNCS, vol. 1978, http://www.isaac.cs.berkeley.edu/isaac/gsm-press.html .
5. Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. Proceedings of the ACM Transactions on Computer Systems (TOCS), 8(1), 18–36.