[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Yong et al., 2005 - Google Patents

Security in GSM

Yong et al., 2005

View PDF
Document ID
10403122248392263277
Author
Yong L
Yin C
Tie-Jun M
Publication year
Publication venue
GSM Security, http://www. gsmsecurity. net/gsm-security-papers. shtml

External Links

Snippet

Global System for Mobile Communications (GSM) is the most popular mobile phone system in the world. According to a press release by the GSM Association recently, there are more than 747.5 million subscribers in over 184 countries today by the time of September 2002 …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Toorani et al. Solutions to the GSM security weaknesses
EP1671511B2 (en) Enhanced security design for cryptography in mobile communication systems
US8064602B2 (en) Method and application for authentication of a wireless communication using an expiration marker
CA2277758A1 (en) Method for securing over-the-air communication in a wireless system
EP1683387B1 (en) Method and apparatus for authentication in wireless communications
Pagliusi A contemporary foreword on GSM security
Korkusuz Security in the GSM Network
Yong et al. Security in GSM
Sher et al. Network access security management (NASM) model for next generation mobile telecommunication networks
Singh et al. Cell phone cloning: a perspective on gsm security
Blumenthal et al. Wireless network security architecture
Kaur et al. A Review of Security issues and mitigation Measures in GSM
Wamyil et al. GSM networks: A review of security threats and mitigation measures
Manos Security and Privacy in the Air interface of cellular networks
Arreymbi Modelling to enhance GSM network security
Preneel Mobile and Wireless Communications Security
Brookson Mobile secure telephones
Arreymbi Investigating Issues in Mobile Network (In) Security
Al Ubaidy GSM SECURITY: THREATS AND CHALLENGES
Bhalerao et al. GSM Security Approach towards the Survey and Evaluations of Presents Situation
Čapkun Security of cellular networks
Arreymbi Examining security in mobile communication networks