First Page | Meta Content | |
---|---|---|
Document Date: 2006-01-17 23:39:50Open Document File Size: 116,93 KBShare Result on FacebookCityPhiladelphia / /CompanyDeutsche Bank / Computer-Communications Networks / UMTS / /ContinentEurope / /CountryUnited States / /CurrencyUSD / / /EventFDA Phase / Business Partnership / /FacilityDarmstadt Germany Stevens Institute of Technology Department / Royal Holloway University of London / UMTS Ulrike Meyer Susanne Wetzel Darmstadt University of Technology Department / /IndustryTermselected algorithms / authentication protocol / valid network / agreement protocols / security capabilities integrity/encryption algorithms / mobile online banking / Wireless Communication General Terms Security Keywords / weak encryption algorithm / generation mobile technologies / broken algorithm / radio network / chosen encryption algorithm / victim device / user equipment / dedicated home network / allowed encryption algorithms / 3G mobile technologies / radio access network / mobile payment systems / mobile banking / encryption algorithms / e-mail applications / radio access networks / e - commerce / technology features / encryption algorithm / security algorithms / /OrganizationUMTS Ulrike Meyer Susanne Wetzel Darmstadt University of Technology Department of Computer Science Hochschulstrasse / IMSI TMSI / Royal Holloway University of London / Mobile Switching Center VLR / Stevens Institute of Technology Department of Computer Science Castle Point / General Packet Radio Service / Mobile Switching Center / VLR MSC / VLR GSN / / /PositionWireless Communication General / Radio Network Controller / Der IMSI-Catcher / forward / /ProductV8 / /ProvinceOrStatePennsylvania / /RadioStationRadio Network Controller / /Technologyhome network / authentication protocol / allowed algorithms / encryption algorithms / three encryption algorithms / encryption algorithm / 3G mobile technologies / broken algorithm / GSM encryption algorithms / mobile phones / secret key / integrity/encryption algorithms / mobile device / key agreement protocols / SSL / packet-switched / weak encryption algorithm / GSM technology / circuit-switched / encryption / 3.0 Protocol / SSL Protocol / 10 D-64283 Darmstadt Germany Stevens Institute of Technology / chosen encryption algorithm / mobile banking / following protocol / selected algorithms / two technologies / security algorithms / GSM / allowed encryption algorithms / third generation mobile technologies / 3G / GSM Air Interface Protocol / /URLhttp /SocialTag |