Preneel, 2008 - Google Patents
Mobile and wireless communications securityPreneel, 2008
View PDF- Document ID
- 17739354173221979599
- Author
- Preneel B
- Publication year
- Publication venue
- NATO ASI on Aspects of Network and Information Security
External Links
Snippet
This article presents an overview of security issues for mobile and wireless communications. It describes the security requirements and architectural options for these networks. Subsequently three technologies are discussed in more detail: mobile phones (GSM and …
- 238000011156 evaluation 0 abstract description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2033479B1 (en) | Method and apparatus for security protection of an original user identity in an initial signaling message | |
Mitchell et al. | Security Analysis and Improvements for IEEE 802.11 i | |
Toorani et al. | Solutions to the GSM security weaknesses | |
Cattaneo et al. | Security Issues and Attacks on the GSM Standard: a Review. | |
Chen et al. | Wireless network security | |
Lackner | A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX. | |
Brown | 802.11: the security differences between b and i | |
Rose et al. | Access security in CDMA2000, including a comparison with UMTS access security | |
Sharma et al. | Exposing the security weaknesses of fifth generation handover communication | |
Cattaneo et al. | A review of security attacks on the GSM standard | |
Bogdanoski et al. | IEEE 802.16 security issues: a survey | |
Trimintzios et al. | WiFi and WiMAX secure deployments | |
Korkusuz | Security in the GSM Network | |
Preneel | Mobile and wireless communications security | |
Ramadan et al. | EEE-GSM: end-to-end encryption scheme over GSM system | |
Jain et al. | Penetration Testing of Wireless EncryptionProtocols | |
Kranakis et al. | Mobile and wireless communications security1 | |
Njoroge et al. | A survey of cryptographic methods in mobile network technologies from 1G to 4G | |
Chaudhary et al. | Vulnerability Analysis of WPA Security Protocols | |
Aminmoghadam et al. | A forward secure PKI-based UMTS-AKA with tunneling authentication | |
van Oorschot | Wireless lan security: 802.11 and wi-fi | |
Manos | Security and Privacy in the Air interface of cellular networks | |
Ahmed Kazi et al. | End-to-End Security for Connected Vehicles | |
Pervaiz et al. | Security in wireless local area networks | |
Ananda Mohan et al. | WiFi Security-A Tutorial |