Cell phone cloning: a perspective on GSM security.
Ramesh SinghPreeti BhargavaSamta KainPublished in: Ubiquity (2007)
Keyphrases
- network security
- access control
- intrusion detection
- rfid tags
- security issues
- viewpoint
- security policies
- security threats
- data security
- mobile communications
- security management
- statistical databases
- security problems
- security requirements
- information assurance
- information security
- security mechanisms
- computer security
- security protocols
- functional requirements
- security systems
- security level
- data mining
- network management
- information technology
- information systems