1. Pütz, S., Schmitz, R., & Martin, T. (2001). Security mechanisms in UMTS. Datenschutz und Datensicherheit, 25, 1–10.
2. Peinado, A. (2004). Privacy and authentication protocol providing anonymous channels in GSM. Computer Communication, 27(17), 1709–1715.
3. Babu, B. S., & Venkataram, P. (2009). A dynamic authentication scheme for mobile transactions. International Journal of Network Security, 8(1), 59–74.
4. Zhang, M. (2003). Provably-secure enhancement on 3GPP authentication and key agreement protocol. Verizon Commun., Cryptology-2003, ePrint Rep. 2003/092.
5. Meyer U., & Wetzel, S. (2004). A man-in-the-middle attack on UMTS. In 3rd ACM WiSe, New York (pp. 90–97).