[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article
Open access

Cell phone cloning: a perspective on GSM security

Published: 01 July 2007 Publication History
First page of PDF

References

[1]
{1}. http://www.gsm-security.net/
[2]
{2}. http://www.crypto.com/papers/others/a5.ps
[3]
{3}. http://jya.com/crack-a5.htm
[4]
{4}. www.isaac.cs.berkeley.edu/isaac/mobicom.pdf
[5]
{5}. www.it.kth.se/courses/2G1723/lectures/encryption.pdf
[6]
{6}. http://www.research.ibm.com/intsec/gsm.ps
[7]
{7}. http://www.cs.berkeley.edu/~daw/papers/a51-fse00.ps
[8]
{8}. http://cryptome.org/a51-bsw.htm
[9]
{9}. http://www.gsm-security.net/papers/a3a8.shtml
[10]
{10}. http://www.gsm-security.net/papers/a51.shtml
[11]
{11}. http://en.wikipedia.org/wiki/Public-key_cryptography
[12]
{12}. http://en.wikipedia.org/wiki/Encryption
[13]
{13}. http://en.wikipedia.org/wiki/Cryptography
[14]
{14}. http://rf-web.tamu.edu/security/secguide/V2comint/Cellular.htm
[15]
{15}. http://www.cs.ucl.ac.uk/staff/t.pagtzis/wireless/gsm/arch.html
[16]
{16}. http://whatis.techtarget.com/
[17]
{17}. http://www.cellular.co.za/gsm_sims_hacked.htm
[18]
{18}. http://www.3gpp.org/TB/Other/algorithms.htm
[19]
{19}. B. Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley and Sons, Inc., New York, NY, USA, second edition, 1996.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Ubiquity
Ubiquity  Volume 2007, Issue July
July 2007
19 pages
EISSN:1530-2180
DOI:10.1145/1286462
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 2007
Published in UBIQUITY Volume 2007, Issue July

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8,503
  • Downloads (Last 6 weeks)665
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Mobile Security and PrivacyEncyclopedia of Wireless Networks10.1007/978-3-319-78262-1_292(881-885)Online publication date: 22-Aug-2020
  • (2019)Mobile Security and PrivacyEncyclopedia of Wireless Networks10.1007/978-3-319-32903-1_292-1(1-5)Online publication date: 15-Aug-2019
  • (2014)Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware systemIEEE INFOCOM 2014 - IEEE Conference on Computer Communications10.1109/INFOCOM.2014.6848180(2355-2363)Online publication date: Apr-2014
  • (2014)Securing offloading process within small cell cloud-based mobile networks2014 IEEE Globecom Workshops (GC Wkshps)10.1109/GLOCOMW.2014.7063378(12-17)Online publication date: Dec-2014
  • (2014)Safety of Lithium-Ion BatteriesLithium-Ion Batteries10.1016/B978-0-444-59513-3.00018-2(409-435)Online publication date: 2014
  • (2012)Implementing geo-encryption in GSM cellular network2012 9th International Conference on Communications (COMM)10.1109/ICComm.2012.6262569(299-302)Online publication date: Jun-2012
  • (2012)Personal Marks and Community CertificatesProceedings of the 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems10.1109/DCOSS.2012.22(83-91)Online publication date: 16-May-2012
  • (2012)Lithium-Ion Battery Systems and TechnologyBatteries for Sustainability10.1007/978-1-4614-5791-6_10(319-357)Online publication date: 28-Nov-2012
  • (2012)Lithium-Ion Battery Systems and TechnologyEncyclopedia of Sustainability Science and Technology10.1007/978-1-4419-0851-3_663(6122-6149)Online publication date: 2012

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media