Untraceability in mobile networks
MobiCom '95 Proceedings of the 1st annual international conference on Mobile computing and networking
The KryptoKnight family of light-weight protocols for authentication and key distribution
IEEE/ACM Transactions on Networking (TON)
Future Mobile Communications Systems in Japan
Wireless Personal Communications: An International Journal
A User Authentication Scheme with Identity and Location Privacy
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Survey findings towards awareness of mobile phones' security issues
DNCOCO'08 Proceedings of the 7th conference on Data networks, communications, computers
Surveying users' practices regarding mobile phones' security features
ECC'09 Proceedings of the 3rd international conference on European computing conference
Trends in users' security perceptions regarding mobile phone usage
ICCOM'10 Proceedings of the 14th WSEAS international conference on Communications
A secure and efficient communication resume protocol for secure wireless networks
DAIS'05 Proceedings of the 5th IFIP WG 6.1 international conference on Distributed Applications and Interoperable Systems
Fast and secure communication resume protocol for wireless networks
Euro-Par'05 Proceedings of the 11th international Euro-Par conference on Parallel Processing
Analysis of the power consumption of secure communication in wireless networks
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Security is a critical issue in mobile radio applications both forthe users and providers of such systems. Although the same may besaid of all communications systems, mobile application havespecial requirements and vulnerabilities, and are therefore ofspecial concern. Emerging wireless networks share many commoncharacteristics with traditional wire-line networks such as publicswitch telephone/data networks, and hence many security issueswith the wire-line networks also apply to the wirelessenvironment. However the integration of security features intowireless communication must take into account restrictions thatmay apply to their use such as small packet size, low bandwidth,high transmission costs, limited processing and storage resourcesand real time constraints. In this paper security requirements inwireless communications along with security features in 2G and 3Gsystems are described.