"Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android."

Jethro Beekman, Christopher Thompson (2013)

Details and statistics

DOI:

access: open

type: Conference or Workshop Paper

metadata version: 2021-02-01

a service of  Schloss Dagstuhl - Leibniz Center for Informatics