A Review of Security Attacks on the GSM Standard.
Giuseppe CattaneoGiancarlo De MaioPompeo FaruoloUmberto Ferraro PetrilloPublished in: ICT-EurAsia (2013)
Keyphrases
- security threats
- security problems
- computer security
- security mechanisms
- security vulnerabilities
- security protocols
- java card
- security breaches
- fault injection
- cyber attacks
- chosen plaintext
- intrusion detection
- stream cipher
- denial of service attacks
- cryptographic protocols
- rfid tags
- iso iec
- malicious attacks
- identity theft
- security policies
- network security
- computer networks
- biometric template
- information security
- key management
- resource constrained
- security measures
- buffer overflow
- intrusion detection and prevention
- end to end