[1]
|
N. B. Azzouna and F. Guillemin, “Experimental Analysis of the Impact of Peer-to-Peer Applications on Traffic in Commercial IP Networks,” European Transactionson Telecommunications, Special Issue on P2PNetworking and P2P Services, Vol. 15, No. 6, November-December 2004, pp. 511-522.
|
[2]
|
T. Karagiannis, A. Broido, N. Brownlee, K. C. Claffy and M. Faloutsos, “Is P2P Dying or Just Hiding?” Proceeding s of IEEE Global Telecommunications Conference, Dallas, Vol. 3, 29 November-3 December 2004, pp. 1532-1538.
|
[3]
|
K. Singh and H. Schulzrinne, “Peer-to-peer Internet Telephony using SIP,” Columbia University Technical Report, CUCS-044-04, New York, October 2004.
|
[4]
|
J. Yang, Y. P. Zhong and S.Y. Zhang, “An Effcient Interest-Group Based Search Mechanism in Unstructured Peer-to-Peer Networks,” Proceddings of the International Conference on Computer Networks and Mobile Computing, Shanghai, 20-23 October 2003, pp. 247-252.
|
[5]
|
H. C. Hsiao and C. T. King, “Bristle: A Mobile Structured Peer-to-Peer Architecture,” Proceeding of International Parallel and Distributed Processing Symposium, Nice, 22-26 April 2003, pp. 33-40.
|
[6]
|
T. H.-T. Hu, B. Thai and A. Seneviratne, “Supporting Mobile Devices in Gnutella File Sharing Network with Mobile Agents,” Proceedings of the 8th IEEE International Symposium on Computers and Communications, Kemer-Antalya, 28 June-1 July 2004, pp. 25-30.
|
[7]
|
S. Liu, W. Jiang and J. Li, “Architecture and Performance Evaluation for P2P Application in 3G Mobile Cellular Systems”, Proceedings of International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, 21-25 September 2007, pp. 914-917. doi:10.1109/WICOM.2007.235
|
[8]
|
3GPP TS 23.002 v5.12.0 3rd Generation Partnership Project; Technical Speci_cation Group Services and Systems Aspects Network architecture (Release 5). Sep. 2003.
|
[9]
|
G. Camarillo and M. A. Garcia Martin, “The 3G IP Multimedia Subsystem,” John Wiley & Sons, Hoboken, ISBN 0470 871563, 2004.
|
[10]
|
D. Wagner, “GSM Cloning,” June 2010
http://www.isaac.cs.berkeley.edu/isaac/gsm.html
|
[11]
|
A. Biryukov, A. Shamir and D. Wagner, “Real Time Cryptanalysis of A5/1 on a PC,” Proceedings of the 7th International Workshop on Fast Software Encryption, 2000, pp. 1-18.
|
[12]
|
G. Koien, “An Introduction to Access Security in UMTS,” IEEE Wireless Communications, Vol. 11, No. 1, 2004, pp. 8-18. doi:10.1109/MWC.2004.1269712
|
[13]
|
Gupta, Gupta, Chang, and Stebila, “Performance Analysis of Elliptic Curve Cryptography for SSL,” Proceedings of the ACM Workshop on Wireless Security, Atlanta, September 2002, pp. 87-94.
|
[14]
|
D. Boneh and M. Franklin, “Identity-Based Encryption From The Weil Pairing,” Proceedings of Cryptology, Lecture Notes in Computer Science, Vol. 2139, Springer, 2001, pp. 213-219.
|
[15]
|
S. Zhao, A. Aggarwal and S. Liu, “Building Secure User-to-User Messaging in Mobile Telecommunication Networks,” Proceedings of Wireless Telecomunications Symposium, Pomona, 24-26 April 2008, pp. 151-157.
doi:10.1109/WTS.2008.4547559
|
[16]
|
K. Hoeper and G. Gong “Preventing or Utilising Key Escrow in Identity-Based Schemes Employed in Mobile Ad Hoc Networks,” International Journal of Security and Networks, Vol. 2, No. ?, 2007, pp. 239-250.
|