𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Cracking GSM

✍ Scribed by Steve Gold


Publisher
Elsevier Science
Year
2011
Tongue
English
Weight
273 KB
Volume
2011
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

✦ Synopsis


So, we have a good idea that 2011 will be an important year for mobile phones and for two-factor authentication. Indeed, 2FA is a lean and effective option for organisational computer security that is easy to use and simple to implement. So, are you one of the 40% that will be adding mobile 2FA to your security measures this year?


πŸ“œ SIMILAR VOLUMES


GSM Security
✍ Bruce Potter πŸ“‚ Article πŸ“… 2004 πŸ› Elsevier Science 🌐 English βš– 97 KB
Iterated GSMs and Co-CFL
✍ Jean -Michel Autebert; Joaquim GabarrΓ³ πŸ“‚ Article πŸ“… 1989 πŸ› Springer-Verlag 🌐 English βš– 872 KB
TriQuint features in 3GSM
πŸ“‚ Article πŸ“… 2005 πŸ› Elsevier Science 🌐 English βš– 43 KB
Stream ciphers for GSM networks
✍ Chi-Chun Lo; Yu-Jen Chen πŸ“‚ Article πŸ“… 2001 πŸ› Elsevier Science 🌐 English βš– 125 KB

With the advance of wireless communications technology, mobile communications has become more convenient than ever. However, because of the openness of wireless communications, how to protect the privacy between communicating parties is becoming a very important issue. In this paper, we focus on the