Audestad, 2011 - Google Patents
Mobile SecurityAudestad, 2011
- Document ID
- 2970121129440058588
- Author
- Audestad J
- Publication year
- Publication venue
- A Multidisciplinary Introduction to Information Security
External Links
Snippet
The Groupe Spécial Mobile (GSM) was established in the autumn of 1982 by the European standardization and policy body CEPT (Conférence Européenne des adminstarsions des Postes et des Télécommunications). In 1988, CEPT was reorganized and the …
- 238000004422 calculation algorithm 0 description 35
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2528268B3 (en) | Cyptographic key generation | |
Forsberg et al. | LTE security | |
Mun et al. | 3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA | |
EP2033479B1 (en) | Method and apparatus for security protection of an original user identity in an initial signaling message | |
US7546459B2 (en) | GSM-like and UMTS-like authentication in a CDMA2000 network environment | |
JP2012110009A (en) | Methods and arrangements for secure linking of entity authentication and ciphering key generation | |
Gharsallah et al. | A secure efficient and lightweight authentication protocol for 5G cellular networks: SEL-AKA | |
KR100920409B1 (en) | Authentication of a wireless communication using expiration marker | |
Mobarhan et al. | Evaluation of security attacks on UMTS authentication mechanism | |
Ouaissa et al. | New security level of authentication and key agreement protocol for the IoT on LTE mobile networks | |
CN101483870A (en) | Cross-platform mobile communication security system implementing method | |
Farhat et al. | Private identification, authentication and key agreement protocol with security mode setup | |
Moroz et al. | Methods for ensuring data security in mobile standards | |
Pütz et al. | Security mechanisms in UMTS | |
Sher et al. | Network access security management (NASM) model for next generation mobile telecommunication networks | |
Caragata et al. | Security of mobile Internet access with UMTS/HSDPA/LTE | |
Farhat et al. | An extended authentication and key agreement protocol of UMTS | |
Audestad | Mobile Security | |
Lang et al. | Research on the authentication scheme of WiMAX | |
Mishra et al. | GSM Mobile Authentication Based on User SIM | |
Southern et al. | Securing USIM-based mobile communications from interoperation of SIM-based communications | |
CN115668859A (en) | Processing module for authenticating a communication device in a 3G-enabled network | |
Fidelis et al. | ENHANCED ADAPTIVE SECURITY PROTOCOL IN LTE AKA | |
Mobarhan et al. | Evaluation of Security Attacks on Different Mobile Communication Systems | |
Doukas | Security Technologies for Mobile Radio Systems |