Privacy enhanced cellular access security
Proceedings of the 4th ACM workshop on Wireless security
Unwanted traffic in 3G networks
ACM SIGCOMM Computer Communication Review
Privacy Enhanced Mobile Authentication
Wireless Personal Communications: An International Journal
Interworking of 3G cellular networks and wireless LANs
International Journal of Wireless and Mobile Computing
Remote monitoring of electromagnetic signals and seismic events using smart mobile devices
Computers & Geosciences
A secure and lightweight approach for routing optimization in mobile IPv6
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Improved authentication algorithm for UMTS
Proceedings of the 2009 International Conference on Hybrid Information Technology
A new authentication and key agreement protocol scheme in convergence of UMTS and DVB-H networks
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
Improved authentication scheme in W-CDMA networks
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Location privacy for cellular systems; analysis and solution
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Hi-index | 0.00 |
The first generation of cellular mobile communications systems contained few if any security measures to protect the system operator and users. The second generation generally did a lot better, and contained entity authentication and confidentiality protection. Although this was a major improvement, security protection in the second generation left a lot to be desired. With the advent of 3G mobile systems a serious effort has been made to create a consistent security architecture based on the threats and risks a 3G system faces.