On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks.
Ulrike MeyerSusanne WetzelPublished in: PIMRC (2004)
Keyphrases
- rfid tags
- stream cipher
- cryptographic protocols
- cellular networks
- security threats
- security mechanisms
- security protocols
- heterogeneous networks
- encryption algorithms
- cryptographic algorithms
- security problems
- key management
- security properties
- information security
- countermeasures
- end to end
- advanced encryption standard
- encryption decryption
- security vulnerabilities
- security measures
- wifi
- security issues
- high security
- security analysis
- encryption scheme
- computer networks
- security risks
- cyber attacks
- social networks
- denial of service attacks
- virtual private network
- java card
- computer security
- security policies
- block cipher
- security architecture
- digital signature
- digital rights management
- secret key
- data encryption
- network security
- intrusion detection
- access control
- key exchange
- public key cryptography
- security requirements