References
- NewBytes News Service Cellular One's Fraud Protection for New Customers
- 동아일보 뉴욕 도둑전화 비상 동아일보
- Cellular Radiotelecommunications Intersystem Operations:Authentications, Signaling Message Encryption and Voice Privacy v.TSB51 TIA/EIA Telecommunications Systems Bulletin
- European Digital Cellular Telecommunications Systems(Phase1);GSM 3.20, Security Related Newwork Functions, Version 3.3.2 European Telecommunications Standards Institute(ETSI)
- Final Draft, ETS 300 175-7, DECT, Common interface, Part 7:Security features European Telecommunication Standard ETSI-RES
- Computer Security and Industrial Cryptography, ESAT Course Security Aspects of Mobile Communications K. Vedder
- CompEuro'92 Security in Mobile and Cordless Telecommunications M. Walker
- Int'. conf. on selected Topics in Wireless Com. Cryptographic Security Techniques for Digital Mobile Telephones J. C. Cooke;R. L. Brewster
- 1st ACM conf. Computer and Communication Security Security Planning for Personal Communication D. Brown
- Proc. 43rd. IEEE VT conf. Authentication and Encryption in a Mobile Communication System R. Akiyama;S. Sasaki
- 한국통신정보보호학회지 v.3 no.4 GSM시스템의 Security 특성에 관한 고찰 오현서;이홍섭;이대기
- U.S. Department of Commerce, Data Encryption Standard, Federal Information Processing Standards Publications 46-1 FIPS Pub. 46-1
- Advances in Cryptology, Proceedings of Eurocrypt'87 Fast Data Encipherment Algorithm FEAL A. Shimizu;S. Miyaguchi
- TTA Interim Standard;800MHz대 디지털 이동 전화 무선 인터페이스, 제1판 한국통신기술협회
- IEEE Trans. Inform. Theory v.22 New Directions in Cryptography W. Diffie;M. Hellman
- Advances in Cryptology, Proceedings of Crypto'89 Dey Distribution Protocol for Digital Mobile Communication Systems M. Tatebayashi;N. Matsuzaki;D. B. Newman
- IEEE Global Telecommunications Conference Privacy and Authentication on a Portable Communications System M. J. Beller;L. Chang;Y. Yacobi
- Advances in Cryptology, Proceedings of Eurocrypt'93 On Dey Distribution and Authentication in Mobile Radio Networks C. S. Park;K. Kaoru;T. Okamoto;S. Tsujii
- Information Procesing Letters v.48 Scheme for Secure Digital Mobile Communications based on Symmetric Key Cryptography T. Hwang
- Communications fo the Association for Computing Machinery v.21 no.2 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems R. L. Rivest;A. Shamir;L. Adleman
- Journal of Cryptology v.7 no.2 Proof of Soundness(Integrity) of Cryptographics Protocols G. J. Simmons
- MIT Lab. for Computer Science v.TR.212 Digitalized Signatures and Public Key Functions as Intractable as Factorization M. O. Rabin
- Communications of the ACM v.24 no.2 Untraceable Electronic Mail, Return Address, and Digital Pseudonyms D. Chaum
- Advances in Cryptology, Eurocrypt'93 Efficient Anonymous Channel and All/Nothing Election Scheme C. S. Park;K. Itoh;K. Kurosawa
- Proceedings of IEEE Symposium on Security and Privacy Preserving Privacy in a Network of Mobile Computers D. A. Cooper;K. P. Birman
- Technical Report of IEICE, IT93-64 Schemes of Anonymous Channel on Communication Networks S. Houmura;R. Sakai;M. Kasahara
- Journal of CRYPTOLOGY v.5 no.2 A Cubic RSA Code Equivalent to Factorization J. H. L. Loxton;D. S. P. Khoo;G. J. Bird;J. Seberry
- Advances in Cryptology, Proceedings of Crypto'90 Differential Cryptanalysis of DES-like Cryptosystems E. Biham;A. Shamir
- Advances in Cryptology, Proceedings of Eurocrypt'93 Linear Cryptanalysis Method for DES Cipher M. Matsui