1. El.Zouka, H. A. (2015). Providing end-to-end secure communications in gsm networks. International Journal of Network Security & Its Applications (IJNSA), 7, 31–41.
2. Kazemi, R., Mosayebi, R., Etemadi, S., Boloursaz, M., & Behnia, F. (2012). A lower capacity bound of secure end to end data transmission via gsm network. In 6th International Symposium on Telecommunications (IST). (IEEE). pp. 1015–1020.
3. Chouhan, A., & Singh, S. (2015). Real time secure end to end communication over gsm network. In 2015 International Conference on Energy Systems and Applications. (IEEE), 2015. pp. 663–668.
4. Challans, P., Gover, R., & Thorlby, J. (2003). End to end data bearer performance characterisation for communications over wide area mobile networks. In IEE Seminar Secure GSM and Beyond: End to End Security for Mobile Communications. IET, 2013.
5. Ciornei, S., & Bogdan, I. (2008). Gsm security-attacks and protection methods (II). In BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI, Publicat de Universitatea Tehnică „Gheorghe Asachi” din Iaşi (pp. 73-82).