Bitte melden Sie sich an um selbst Rezensionen oder Kommentare zu erstellen.
Zitieren Sie diese Publikation
Mehr Zitationsstile
- bitte auswählen -
%0 Conference Paper
%1 conf/woot/BeekmanT13
%A Beekman, Jethro
%A Thompson, Christopher
%B WOOT
%D 2013
%E Oberheide, Jon
%E Robertson, William K.
%I USENIX Association
%K dblp
%T Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android.
%U http://dblp.uni-trier.de/db/conf/woot/woot2013.html#BeekmanT13
@inproceedings{conf/woot/BeekmanT13,
added-at = {2021-02-01T00:00:00.000+0100},
author = {Beekman, Jethro and Thompson, Christopher},
biburl = {https://www.bibsonomy.org/bibtex/23e304e516626bc2747e4d41f26651ea3/dblp},
booktitle = {WOOT},
crossref = {conf/woot/2013},
editor = {Oberheide, Jon and Robertson, William K.},
ee = {https://www.usenix.org/conference/woot13/workshop-program/presentation/beekman},
interhash = {26da45c76aa266d5907449f8d57a06ba},
intrahash = {3e304e516626bc2747e4d41f26651ea3},
keywords = {dblp},
publisher = {USENIX Association},
timestamp = {2024-04-09T15:37:11.000+0200},
title = {Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android.},
url = {http://dblp.uni-trier.de/db/conf/woot/woot2013.html#BeekmanT13},
year = 2013
}