Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Altaf Shaik"'
Publikováno v:
Proceedings on Privacy Enhancing Technologies
Proceedings on Privacy Enhancing Technologies, De Gruyter Open, 2019, 2019 (3), pp.108-127. ⟨10.2478/popets-2019-0039⟩
Proceedings on Privacy Enhancing Technologies, 2019, 2019 (3), pp.108-127. ⟨10.2478/popets-2019-0039⟩
Proceedings on Privacy Enhancing Technologies, Vol 2019, Iss 3, Pp 108-127 (2019)
Proceedings on Privacy Enhancing Technologies, De Gruyter Open, 2019, 2019 (3), pp.108-127. ⟨10.2478/popets-2019-0039⟩
Proceedings on Privacy Enhancing Technologies, 2019, 2019 (3), pp.108-127. ⟨10.2478/popets-2019-0039⟩
Proceedings on Privacy Enhancing Technologies, Vol 2019, Iss 3, Pp 108-127 (2019)
Mobile communications are used by more than two-thirds of the world population who expect security and privacy guarantees. The 3rd Generation Partnership Project (3GPP) responsible for the worldwide standardization of mobile communication has designe
Publikováno v:
NDSS
Mobile communication systems are now an essential part of life throughout the world. Fourth generation “Long Term Evolution” (LTE) mobile communication networks are being deployed. The LTE suite of specifications is considered to be significantly
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e733f5d90516f3a3a4df3faa43cf870c
https://doi.org/10.14722/ndss.2016.23236
https://doi.org/10.14722/ndss.2016.23236
Publikováno v:
WiSec
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks-WiSec 19
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks -WiSec '19
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks-WiSec 19
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks -WiSec '19
Cellular devices support various technical features and services for 2G, 3G, 4G and upcoming 5G networks. For example, these technical features contain physical layer throughput categories, radio protocol information, security algorithm, carrier aggr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6b005353749cb7696ff840aa79fac674
https://zenodo.org/record/4671828
https://zenodo.org/record/4671828
Publikováno v:
WPES@CCS
IMSI catchers threaten the privacy of mobile phone users by identifying and tracking them. Commercial IMSI catcher products exploit vulnerabilities in cellular network security standards to lure nearby mobile devices. Commercial IMSI catcher's techni
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3567c64dacd70313386550fcb1b51a3c
Publikováno v:
WISEC
Mobile network operators choose Self Organizing Network (SON) concept as a cost-effective method to deploy LTE/4G networks and meet user expectations for high quality of service and bandwidth. The main objective of SON is to introduce automation into
Publikováno v:
SPSM@CCS
With its high penetration rate and relatively good clock accuracy, smartphones are replacing watches in several market segments. Modern smartphones have more than one clock source to complement each other: NITZ (Network Identity and Time Zone), NTP (