Subject
Information Systems and Management,Computer Networks and Communications,Safety, Risk, Reliability and Quality
Reference8 articles.
1. Biryukov, Shamir, Wagner — Real Time Cryptanalysis of A5/1 on a PC,
2. Status of GSM Crypto Attacks,
3. Wagner et al. — GSM Cloning (Cracking COMP128),
4. Nokia Mobile Location Services,
5. Ericsson’s Mobile Positioning System (MPS),
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Alphacodes;Proceedings of the 7th Annual Symposium on Computing for Development;2016-11-18
2. Introduction: Confidentiality, Integrity, and Availability Threats in Mobile Phones;Mobile Phone Security and Forensics;2016
3. Introduction: Confidentiality, Integrity, and Availability Threats in Mobile Phones;SpringerBriefs in Electrical and Computer Engineering;2012
4. Security in Mobile Governmental Transactions;2009 Second International Conference on Computer and Electrical Engineering;2009