15 Haziran 2008 Pazar

THE LİNKS ABOUT GSM
Literatura
[1] Jeremy Quirke: Security in the GSM system, http://www.ausmobile.com
[2] Bruce Schneir: Applied cryptography, John Wiley & Sons, USA, 1996.
[3] Ignac Lovrek: Predavanja iz predmeta Komunikacijski protokoli, Zavod za telekomunikacije, FER, Zagreb
[4] Javier Gozalvez Sempere: An overview of the GSM system, http://www.comms.eee.strath.ac.uk
[5] John Scourias: Overview of the Global System for Mobile Communications, http://ccnga.uwaterloo.ca
[6] Charles Brookson: GSM security and encryption, http://www.brookson.com
[7] Marc Briceno, Ian Goldberg, and David Wagner: An implementation of the GSM A3A8 algorithm. http://www.gsm-security.net
[8] Limor Elbaz: Using public key cryptography in mobile phones, http://www.discretix.com
[9] Tomislav Novosel: Seminarski rad iz Opercijskih sustava 2, A5 algoritam kriptiranja podataka, http://sigurnost.zemris.fer.hr
[10] Dalibor Hrg: Seminarski rad iz Opercijskih sustava 2, RC4, http://sigurnost.zemris.fer.hr
[11] Phillip Rogaway and Don Coppersmith: A Software-Optimized Encryption Algorithm, http://www.cs.ucdavis.edu
[12] Bruce Schneir: The Solitaire Encryption Algorithm, http://www.schneier.com/solitaire.html
[13] Paul Crowley: Problems with Bruce Schneier's "Solitaire", http://www.ciphergoth.org/crypto/solitaire/
[14] David J. Wheeler: A Bulk Data Encryption Algorithm, http://www.cix.co.uk
[15] Tomas Balderas-Contreras, Rene A. Cumplido Parra: An Efficient Hardware Implementation of The KASUMI Block Cipher for Third Generation Cellular Networks, http://ccc.inaoep.mx

Hiç yorum yok: