Authentication and key agreement Dedicated channel acquisition References 1. 3GPP: TS 23.401 ? General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access ,
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) ,
DOI : 10.1007/978-3-642-30436-1_2
URL : https://hal.archives-ouvertes.fr/hal-01518240
Breaking and fixing the Android Launching Flow, Computers & Security, vol.39, issue.0, 2013. ,
DOI : 10.1016/j.cose.2013.03.009
Engineering a secure mobile messaging framework, Computers & Security, vol.31, issue.6, pp.771-781, 2012. ,
DOI : 10.1016/j.cose.2012.06.004
SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.520-526, 2011. ,
DOI : 10.1109/IMIS.2011.65
SPEECH: Secure Personal End-to-End Communication with Handheld, ISSE 2006, Securing Electronic Busines Processes, pp.287-297978, 2006. ,
DOI : 10.1007/978-3-8348-9195-2_31
Do You Trust Your Phone?, Commerce and Web Technologies, pp.50-61978, 2009. ,
DOI : 10.1109/MSP.2009.29
A botnet-based command and control approach relying on swarm intelligence, Journal of Network and Computer Applications, vol.38, issue.0, 2013. ,
DOI : 10.1016/j.jnca.2013.05.002
An Extensible Framework for Efficient Secure SMS, 2010 International Conference on Complex, Intelligent and Software Intensive Systems, pp.843-850, 2010. ,
DOI : 10.1109/CISIS.2010.81
Nightmares with Mobile Devices are Just around the Corner!, 2007 IEEE International Conference on Portable Information Devices, pp.1-5, 2007. ,
DOI : 10.1109/PORTABLE.2007.14
URL : http://www.osti.gov/scitech/servlets/purl/911859
Mobile healthcare information management utilizing Cloud Computing and Android OS, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology, pp.1037-1040, 2010. ,
DOI : 10.1109/IEMBS.2010.5628061
A survey of mobile malware in the wild, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pp.3-14, 2011. ,
DOI : 10.1145/2046614.2046618
Can you infect me now?, Proceedings of the 2007 ACM workshop on Recurring malcode, WORM '07, pp.61-68, 2007. ,
DOI : 10.1145/1314389.1314402
Attacking the attach procedure in cellular networks, Journal of Ambient Intelligence and Humanized Computing, issue.0, 2014. ,
Smart-phone attacks and defenses, p.HotNets III, 2004. ,
GSM networks: protocols, terminology, and implementation, 1999. ,
Signaling-Oriented DoS Attacks in UMTS Networks, Advances in Information Security and Assurance, pp.280-289, 2009. ,
DOI : 10.1007/11542322_12
Vulnerabilities of UMTS Access Domain Security Architecture, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp.350-355, 2008. ,
DOI : 10.1109/SNPD.2008.78
Mobile decision support system for outreach health worker, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, pp.56-59, 2011. ,
DOI : 10.1109/HEALTH.2011.6026786
Memory Support Through Pervasive and Mobile Systems, Inter-Cooperative Collective Intelligence: Techniques and Applications. In: Studies in Computational Intelligence, 2013. ,
DOI : 10.1007/978-3-642-35016-0_9
Rise of the iBots: Owning a telco network, 2010 5th International Conference on Malicious and Unwanted Software, pp.71-80, 2010. ,
DOI : 10.1109/MALWARE.2010.5665790
Smartphone-Based Applications for Investigating Falls and Mobility, Proceedings of the 5th International ICST Conference on Pervasive Computing Technologies for Healthcare, pp.258-261, 2011. ,
DOI : 10.4108/icst.pervasivehealth.2011.246060
Mitigating attacks on open functionality in SMS-capable cellular networks, Proceedings of the 12th annual international conference on Mobile computing and networking , MobiCom '06, pp.182-193, 2006. ,
DOI : 10.1145/1161089.1161111
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.9317
On cellular botnets, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.223-234, 2009. ,
DOI : 10.1145/1653662.1653690
On attack causality in internetconnected cellular networks, Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pp.1-16, 2007. ,
Wedjat: a mobile phone based medicine intake reminder and monitor, Ninth IEEE International Conference on, pp.423-430, 2009. ,
DOI : 10.1109/bibe.2009.60
URL : https://ir.nctu.edu.tw:443/bitstream/11536/17350/1/000277202300069.pdf