Jump to navigation
Mobile Phone Security Specializing in GSM, UMTS, and LTE Networks
Lewis, David Royer
Interlando, CarmeloBowers, JanetRiggins, Alan
xiii, 132 pages : illustrations
This work is intended to be an in depth overview of the mobile phone security algorithms such as A3, A8, A5/1, A5/2, and Milenage that are used in GSM based networks. This material is not usually found in textbooks and should be useful to students being introduced to the field of cryptography.
Includes bibliographical references (pages 103-104).
Mathematics and Statistics
Master of Arts (M.A.) San Diego State University, 2014
© 2015 SDSU Library & Information Access. All Rights Reserved.