SECURITY ASPECTS IN GSM AND ITS FLAWS (original) (raw)
Related papers
International Journal of Computer Applications, 2020
A contemporary foreword on GSM Security
Infrastructure Security, 2002
GSM Security Approach towards the Survey and Evaluations of Presents Situation
Security Issues and Attacks on the GSM Standard: a Review
Solutions to the GSM Security Weaknesses
2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies, 2008
Enhanced the security of GSM (Global system for mobile)
A Review of Security Attacks on the GSM Standard
A Review on Security in Mobile Communication Technology
2016
IJERT-Augmenting GSM Security Focusing on its Issues and Solutions
International Journal of Engineering Research and Technology (IJERT), 2014
A Survey on the Security Vulnerabilities of Cellular Communication Systems (GSM-UMTS-LTE)
2016
Investigating Issues in Mobile Network (In)Security
Modern Applied Science, 2008
GSM Technology and security impact
Ahmad Sharifi, Mohsen Khosravi
Security Management System of Cellular Communication: Case Study
2008
Security in Mobile Telecommunication Networks
Christian Bonnet, Jérôme Härri
Wireless and Mobile Network Security, 2009
Security in Mobile Telephony: The Security Levels in the Different Handy Generations
NPA: Protocol for Secure Communications in GSM Cellular Network
in the proceedings of The 10th Annual IEEE Consumer Communications & Networking Conference (CCNC-2013), Wireless Communication Track, 2013
Journal of Southwest Jiaotong University, 2020
Secured Voice Communication via GSM Network
Security in future mobile networks
1997
SAKA: A Secure Authentication and Key Agreement Protocol for GSM Networks
2013
Security measures and weaknesses of the GPRS security architecture
2008
A Study of Mobile and Wireless Network Communication from Security Perspectives
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2023
Towards securing 3G mobile phones
Proceedings. Ninth IEEE International Conference on Networks, ICON 2001., 2001
Implications of Unlicensed Mobile Access (UMA) for GSM security
2005
Security Architecture for Mobile Communication Systems
Implementation of Cryptographic Algorithms for GSM Cellular Standard
Mobile Computing and its Security
2019
Questioning the Feasibility of UMTS-GSM Interworking Attacks
Wireless Personal Communications, 2012
Security in third Generation Mobile Networks
Computer Communications, 2004
Improving security and privacy in current mobile systems
2017
Mobile Security : Security Mechanisms and Protection of Mobile Applications
2014