Security Issues and Attacks on the GSM Standard: a Review (original) (raw)
Related papers
A Review of Security Attacks on the GSM Standard
A contemporary foreword on GSM Security
Infrastructure Security, 2002
Enhanced the security of GSM (Global system for mobile)
International Journal of Computer Applications, 2020
SECURITY ASPECTS IN GSM AND ITS FLAWS
2000
IJERT-Augmenting GSM Security Focusing on its Issues and Solutions
International Journal of Engineering Research and Technology (IJERT), 2014
IRJET-Securing Mobile Technology of GSM using A5/1 Algorithm
Solutions to the GSM Security Weaknesses
2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies, 2008
NPA: Protocol for Secure Communications in GSM Cellular Network
in the proceedings of The 10th Annual IEEE Consumer Communications & Networking Conference (CCNC-2013), Wireless Communication Track, 2013
GSM Security Approach towards the Survey and Evaluations of Presents Situation
SAKA: A Secure Authentication and Key Agreement Protocol for GSM Networks
2013
Implementation of Cryptographic Algorithms for GSM Cellular Standard
Retrofitting Mutual Authentication to GSM Using RAND Hijacking
Lecture Notes in Computer Science, 2016
Secure Data and Voice Transmission over GSM Voice Channel: Applications for Secure Communications
An Enhanced NPA Protocol for Secure Communications in GSM Network
2013
Security in Mobile Telecommunication Networks
Christian Bonnet, Jérôme Härri
Wireless and Mobile Network Security, 2009
A Survey on the Security Vulnerabilities of Cellular Communication Systems (GSM-UMTS-LTE)
2016
Secure Algorithms for SAKA Protocol in the GSM Network
Security in future mobile networks
1997
Cryptanalysis of GSM encryption algorithm A5/1
ISC Int. J. Inf. Secur., 2012
A5-based GSM cryptosystem implementation and analysis
2017
Questioning the Feasibility of UMTS-GSM Interworking Attacks
Wireless Personal Communications, 2012
Secured Voice Communication via GSM Network
Security in Mobile Telephony: The Security Levels in the Different Handy Generations
Signaling Attacks in Mobile Telephony
Improving security and privacy in current mobile systems
2017
A Review on Security in Mobile Communication Technology
2016
Cryptography in mobile devices Security Protocols, 6CS513
Survey on Threats and Attacks on Mobile Networks
IEEE Access, 2016
Security Architecture for Mobile Communication Systems
Implimentation of Cryptographic Algorithm for GSM and UMTS Systems
International Journal of Network Security & Its Applications, 2011