Mobile security catching up? revealing the nuts and bolts of the security of mobile devices

M Becher, FC Freiling, J Hoffmann… - … IEEE Symposium on …, 2011 - ieeexplore.ieee.org
We are currently moving from the Internet society to a mobile society where more and more
access to information is done by previously dumb phones. For example, the number of …

On security research towards future mobile network generations

D Rupprecht, A Dabrowski, T Holz… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …

[图书][B] Understanding cryptography

C Paar, J Pelzl - 2010 - Springer
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …

Breaking LTE on layer two

D Rupprecht, K Kohls, T Holz… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
Long Term Evolution (LTE) is the latest mobile communication standard and has a pivotal
role in our information society: LTE combines performance goals with modern security …

Identity and content authentication for phone calls

PG Traynor, BG Reaves, LE Blue, L Vargas… - US Patent …, 2020 - Google Patents
H04L 9/32(2006.01) H04W 12/04(2009.01) H04L 29/06(2006.01) H04W 12/06(2009.01)
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …

Mind your SMSes: Mitigating social engineering in second factor authentication

H Siadati, T Nguyen, P Gupta, M Jakobsson… - Computers & …, 2017 - Elsevier
SMS-based second factor authentication is a cornerstone for many service providers,
ranging from email service providers and social networks to financial institutions and online …

Pripayd: privacy friendly pay-as-you-drive insurance

C Troncoso, G Danezis, E Kosta… - Proceedings of the 2007 …, 2007 - dl.acm.org
Pay-As-You-Drive insurance systems are establishing themselves as the future of car
insurance. However, their current implementations entail a serious privacy invasion. We …

[图书][B] Secret history: The story of cryptology

C Bauer - 2021 - taylorfrancis.com
The first edition of this award-winning book attracted a wide audience. This second edition is
both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no …

Mystique: Evolving android malware for auditing anti-malware tools

G Meng, Y Xue, C Mahinthan, A Narayanan… - Proceedings of the 11th …, 2016 - dl.acm.org
In the arms race of attackers and defenders, the defense is usually more challenging than
the attack due to the unpredicted vulnerabilities and newly emerging attacks every day …

Collaborative security: A survey and taxonomy

G Meng, Y Liu, J Zhang, A Pokluda… - ACM Computing Surveys …, 2015 - dl.acm.org
Security is oftentimes centrally managed. An alternative trend of using collaboration in order
to improve security has gained momentum over the past few years. Collaborative security is …