Author:
Kambourakis Georgios,Kolias Constantinos,Gritzalis Stefanos,Hyuk-Park Jong
Publisher
Springer Berlin Heidelberg
Reference15 articles.
1. 3GPP Organization, http://www.3gpp.org/ (accessed, 13/01/2008)
2. 3rd Generation Partnership Project 2, 3GPP2, http://www.3gpp2.org/
3. Kazumi Algorithm Specification, ETSI TS 135 202 V7.0.0, http://www.etsi.org/website/document/algorithms/ts_135202v070000p.pdf (accessed, 13/01/2008)
4. Tang, C., Wu, D.O.: Mobile Privacy in Wireless Networks-Revisited. IEEE transactions on the wireless communications 7(3), 1035–1042 (2008)
5. Meyer, U., Wetzel, S.: A Man-in-the-Middle Attack on UMTS. In: WiSe 2004, Philadelphia, Pennsylvania, USA, October 1 (2004)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Vulnerabilities in UMTS Location Update Procedure and Its Countermeasures;Lecture Notes in Electrical Engineering;2018-06-07
2. TermID: a distributed swarm intelligence-based approach for wireless intrusion detection;International Journal of Information Security;2016-06-18
3. Secure-AKA: An Efficient AKA Protocol for UMTS Networks;Wireless Personal Communications;2014-05-09
4. A Denial of Service Attack to UMTS Networks Using SIM-Less Devices;IEEE Transactions on Dependable and Secure Computing;2014-05
5. Effects of Signaling Attacks on LTE Networks;2013 27th International Conference on Advanced Information Networking and Applications Workshops;2013-03