Back to Results
First PageMeta Content
Combinatorics / Attack tree / Multiset / GSM / Attribute grammar / Flow network / Mathematics / Graph theory / Computer network security


Analyzing the Security in the GSM Radio Network using Attack Jungles Parosh Aziz Abdulla1 , Jonathan Cederberg1 , and Lisa Kaati2? 1 University of Uppsala, Sweden, email: {parosh, jonathan.cederberg}@it.uu.se
Add to Reading List

Document Date: 2011-10-12 02:21:46


Open Document

File Size: 488,99 KB

Share Result on Facebook

Company

Ask / Agency for Innovation / Ericsson / Amenaza Technologies / /

Country

Sweden / /

Currency

pence / USD / /

/

Facility

University of Uppsala / Base Transceiver Station / /

IndustryTerm

monotonic transition systems / prototype tool / Internet Buy ingredients Shadow victim Dumpster diving Buy / find seller / radio access network / access network / main security services / radio network / user equipment / mobile network / layer services / /

NaturalFeature

Attack Jungles / Attack Jungle / /

Organization

Swedish Governmental Agency for Innovation Systems / University of Uppsala / Swedish Defence Research Agency / /

Person

Bruce Schneier / /

Position

horse head / system administrator / Base Station Controller / representative / head / /

Technology

encryption / cellular telephone / 6 Algorithm / GSM system / smart card / The algorithm / mobile phones / 3 Algorithm / GSM / secret key / /

SocialTag