Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards.
Josyula R. RaoPankaj RohatgiHelmut ScherzerStéphane TinguelyPublished in: IEEE Symposium on Security and Privacy (2002)
Keyphrases
- rfid tags
- countermeasures
- security protocols
- mobile communication
- security mechanisms
- malicious users
- linux kernel
- partitioning algorithm
- attack detection
- security threats
- database systems
- malicious attacks
- traffic analysis
- watermarking scheme
- information security
- end to end
- lightweight
- computer security
- ddos attacks
- graph partitioning
- remote control
- mobile communications
- privacy preserving
- database