1 |
顾奕, 吴韶波 . WLAN与3G的融合方案及安全性分析. 北京机械工业学院学报, 2008,23(1): 42~46
|
2 |
3GPP TS 33.102 V.8.0.0.3rd generation partnership project,technical specification group services and system aspects,3G security,security architecture, 2008
|
3 |
3GPP TS GSA S3-050043.Review of recently published papers on GSM and UMTS security. Sophia Antipolis, France, 2005
|
4 |
杨义先, 忸心忻 . 无线通信安全技术. 北京: 北京邮电大学出版社, 2005
|
5 |
朱红儒, 胡志远, 冯登国 . 第三代移动通信系统安全. 北京: 电子工业出版社, 2009
|
6 |
Ulrike Meyer , Susanne Wetzel . A man-in-the-middle attack on UMTS.In: Proceedings of the 3rd ACM Workshop on Wireless Security, 2004
|
7 |
Ulrike Meyer , Susanne Wetzel . On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks.In: Proceedings of the 15th IEEE International Symposium on Personal,Indoor and Mobile Radio Communications, 2004
|
8 |
Zahra Ahmadian , Somayeh Salimi , Ahmad Salahi . Security enhancements against UMTS-GSM interworking attacks. The International Journal of Computer and Telecommunications Networking, 2010
|
9 |
Elad Barkan , Eli Biham , Nathan Keller . Instant ciphertext-only cryptanalysis of GSM encrypted communication. Journal of Cryptology, 2008,21(3): 392~429
|
10 |
Mehreen Afzal , Ashraf Masood , Naveed Shehzad . Improved results on algebraic cryptanalysis of A5/2.In: Proceedings of the International Conference of Global ESecurity,Communications in Computer and Information Science, Springer-Verlag, 2008
|
11 |
曾勇 . 一种基于非对称密钥密码体制的IMSI 保护方案. 通信技术, 2008,48(9):152~154
|
12 |
3GPP TS 23.234 V.6.1.0.Group services and system aspects:3GPP system to wireless local area networks (WLAN)interworking, system description(Release 6), 2004
|
13 |
3GPP TS 22.934 V.6.2.0. Service and system aspects: feasibility study on 3GPP system to wireless local area network(WLAN) interworking(Release6), 2003
|
14 |
3GPP TS 33.234. Wireless local area network(WLAN)interworking security(Release 6), 3G security, 2003
|
15 |
Jari Arkko , Henry Haverinen . EAP AKA authentication,draft-arkko-pppext-eap-aka-10.txt. 2003
|
16 |
3GPP TS 33.234. Technical specification group services and system aspects, 3G security, wireless local area network(WLAN) interworking security, 2004
|
17 |
窦文 . 3G 与 WLAN 的安全性分析和互连安全性的研究. 南京: 东南大学工程硕士学位论文, 2006
|
18 |
李亚军 . 异构无线网络安全协议研究. 西安: 西安电子科技大学博士学位论文, 2009
|
19 |
Hostap device driver, , 2010
|
20 |
About the IM, , 2010
|
21 |
Junior Walker . Unsafe at any key size: an analysis of the WEP encapsulation. IEEE Document 802.11-00/362, 2000
|
22 |
Stubblefield A , Ioannidis J , Rubin A D . Using the fluhrer,mantin,and shamir attack to break WEP.In: Proceedings of the 2002 Network and Distributed Systems Symposium, 2002
|
23 |
Zhang Lizhuo , Jia Weijia , Wen Sheng , et al. A man-in-the-middle attack on 3G-WLAN interworking.In: Proceedings of the 2010 International Conference on Communications and Mobile Computing, 2010
|
24 |
孙红, 王颖慧, 许涛 et al. 3G-WLAN 中EAP-AKA 协议信令使用的改进. 计算机应用于软件, 2010,27(3):13~14,35
|
25 |
张树彬, 孙皓, 吴越 . EAP-AKA 研究与改进. 信息安全与通信保密, 2007(10):60~62
|
26 |
张胜, 徐国爱, 胡正名 等. EAP-AKA 协议的分析和改进. 计算机应用研究, 2005,22(7):234~236
|