1. Walker, M., Wright, T.: Security. In: Hillebrand, F. (ed.) GSM and UMTS: The creation of global mobile communication, pp. 385–406. John Wiley & Sons, Chichester (2002)
2. Schneier, B.: Appled cryptography: Protocols, algorithms and source code in C, 2nd edn. John Wiley & Sons Inc., New York (1996)
3. ETSI. 3GPP TS 35.201. Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 1: f8 and f9 Specification (June 2002)
4. Bluetooth SIG. Specification of the Bluetooth System 2.0 (Accessed January 2005), Available at: http://www.bluetooth.com
5. Lecture Notes in Computer Science;T. Johansson,2003