Short Message Service (sms) security solution for mobile devices



Download 1,13 Mb.
Pdf ko'rish
bet51/51
Sana09.06.2022
Hajmi1,13 Mb.
#647072
1   ...   43   44   45   46   47   48   49   50   51
Bog'liq
06Dec Ng Yu

LIST OF REFERENCES 
[1] Rafat, 
Ali, 
The SMS Privacy Problem
, Textually.org website, 
http://www.textually.org/textually/archives/2004/04/003489.htm
, last accessed 19 
October 2006 
[2] 
Breed, Allen G., 
Ubiquitous message technology can be powerful tool for 
good or ill
, TMCNet Website,
http://www.tmcnet.com/usubmit/2006/10/17/1985881.htm
, last accessed 19 
October 2006. 
[3] Jones, 
Nick, 
Don't Use SMS for Confidential Communication
, Gartner 
Website, 26 November 2002, 
http://www.gartner.com/DisplayDocument?doc_cd=111720
, last accessed 19 
October 2006. 
[4] GSM 
World, 
GSM Facts and Figures

http://www.gsmworld.com/news/statistics/index.shtml
, last accessed 17 October 
2006. 
[5] 
GSM World, GSM Services, 
http://www.gsmworld.com/services/index.shtml
, last accessed 17 October 2006. 
[6] European 
Telecommunications Standards Institute, 
GSM 02.01, Digital 
cellular telecommunications system; Principles of telecommunication services 
supported by a GSM Public Land Mobile Network (PLMN)

[7] 
Vijay, K. Garg and Joseph E. Wilkes, Principles & Applications of GSM, 
Prentice Hall 1999. 
[8]
European Telecommunications Standards Institute, 
GSM 02.09, Security 
aspects

[9] A. 
Mehrotra, 
GSM System Engineering
. Norwood, MA: Artech House
1997. 
[10] European Telecommunications Standards Institute, 
GSM 02.17, 
Subscriber Identity Module
[11] European Telecommunications Standards Institute, 
GSM 03.20, Security 
related network functions


 92
[12] Margrave, 
David, 
GSM Security and Encryption

http://www.hackcanada.com/blackcrawl/cell/gsm/gsm-secur/gsm-secur.html
, last 
accessed on 17 October 2006. 
[13] 
Pesonen, Lauri , GSM Interception, Helsinki University of Technology
21.11.1999, 
http://www.dia.unisa.it/professori/ads/corso-security/www/CORSO-
9900/a5/Netsec/netsec.html
, last accessed 17 October 2006. 
[14] GSM 
Cloning, 
http://www.isaac.cs.berkeley.edu/isaac/gsm.html
, last 
accessed 17 October 2006. 
[15] 
Josyula, R. Rao, Pankaj Rohatgi and Helmut Scherzer. IBM Watson 
Research Center, 
Proceedings of the 2002 IEEE Symposium on Security and 
Privacy (S&P‘02).
[16] GSM 
Security, 
http://www.gsm-security.net/faq/gsm-encryption-algorithm-
a5-cipher.shtml
, last accessed 25 October 2006. 
[17] 
Elad, Barkan, Eli Biham, Nathan Keller, 
Instant Ciphertext-Only 
Cryptanalysis of GSM Encrypted Communication
, CS-2003-05, 
Proceedings of Crypto 2003.
[18] 
Traynor, Patrick, William Enck, and Patrick McDaniel and Thomas La 
Porta, 
Mitigating Open Functionality in SMS-Capable Cellular Networks

Proceedings of the ACM Twelfth Annual International Conference on Mobile 
Computing and Networking (MobiCom), September 2006. 
[19] 
Guthery, Scott and Cronin, Mary, 
Mobile Application Development with 
SMS and the SIM Toolkit
, McGraw Hill, 2002. 
[20] Mobile/Cellular 
Technology,
 SMS (Short Message System) Mobile 
Technology, International,
http://www.mobilecomms-
technology.com/projects/sms/
, last accessed 23 October 2006. 
[21] 
Starhub Mobile Service: Price Plans, Starhub Website, 
http://www.starhub.com/mobile/mobileservice/voiceplans.html#voice
, last 
accessed 25 October 2006. 
[22] 
ETSI Technical Specification TS 101 181 V8.9.0 (2005-06) Digital cellular 
telecommunications system (Phase 2+); Security mechanisms for SIM 
application toolkit; Stage 2 (3GPP TS 03.48 version 8.9.0 Release 1999). 
[23] 
Ponemon Institute, LLC, 
U.S. Survey: Confidential Data at Risk

http://www.securitymanagement.com/library/Ponemon_laptoptheft1106.pdf
, last 
accessed on 30 October 2006. 


 93
[24] 
GSM Association Press Release 2006, 
Mobile Networks to Cover 90% of 
the World's Population by 2010,
http://www.gsmworld.com/news/press_2006/press06_51.shtml
, last accessed 30 
October 2006. 
[25] Singh, 
Gurminder, 
Mobile Alerts Project Slides
, May 2006, 
http://www.nps.navy.mil/cs/singh/CMDC/MobileAlerts.pdf
, last accessed on 1 
July 2006. 
[26] 
Le, Phong and Hsu, Michael, 
Web Portal for the Integrated Messaging 
System
. M.Sc. Dissertation, Naval Postgraduate School, Monterey, CA, 2006. 
[27] 
General Dynamics C4 Systems, 
General Dynamics Announces First Type 
1 Secure Phone for GSM

http://www.gdc4s.com/news/detail.cfm?prid=96
, last 
accessed 27 October 2006. 
[28] Schneier, 
Bruce, 
Applied Cryptography
, Second Edition, John Wiley & 
Sons, 1996. 
[29] 
Kaufmann, Charlie, Perlman Radia, Speciner Mike, 
Network Security: 
Private Communications in a Public World
, Prentice Hall, 2002. 
[30] Denning, Dorothy, 
Information Warfare and Security
, Addison Wesley
1999. 
[31] 
Saltzer, Jerome H. and Schroeder, Michael D.,
 The Protection of 
Information in Computer Systems
. Proceedings of the IEEE, 63(9):1278–1308, 
1975. 
[32] Hagai, Bar-El, 
Introduction to Side Channel Attacks

http://www.discretix.com/PDF/Introduction%20to%20Side%20Channel%20Attack
s.pdf
, last accessed 13 November 2006. 
[33] Handys-Mobile 
Website, 
http://www.handys-
mobile.de/img/eten_m600.jpg
, last accessed 7 November 2006. 
[34] 
Microsoft Developer Network
Learn Windows Mobile: Overview

http://msdn.microsoft.com/windowsmobile/learning/#WMApps
, last accessed 7 
November 2006. 
[35] 
Microsoft Developer Network, 
Windows Mobile Version 5.0 SDK 
BatteryLevel numeration, 
http://msdn.microsoft.com/library/default.asp?url=/library/en-
us/mobilesdk5/html/T_Microsoft_WindowsMobile_Status_BatteryLevel.asp
, last 
accessed 8 November 2006. 


 94
[36] Bishop, 
Matt, 
Computer Security: Art and Science
, Addison Wesley, 2005. 
[37] 
Alex Varshavsky, Mike Y. Chen, Eyal de Lara, Jon Froehlich, Dirk 
Haehnel, Jeffrey Hightower, et al. , 
Are GSM phones THE solution for 
localization?

http://placelab.org/publications/pubs/GSM-hotmobile2006.pdf
, last 
accessed 24 November 2006. 


 95
INITIAL DISTRIBUTION LIST 
1. 
Defense Technical Information Center 
Ft. Belvoir, Virginia
2. 
Dudley Knox Library 
Naval Postgraduate School 
Monterey, California
3. 
Professor Yeo Tat Soon 
Director, Temasek Defence Systems Institute (TDSI) 
National University of Singapore 
Singapore

Download 1,13 Mb.

Do'stlaringiz bilan baham:
1   ...   43   44   45   46   47   48   49   50   51




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish