Vulnerabilities in the Telephony
Part of the Advances in Information Security book series (ADIS, volume 40)
- 480 Downloads
KeywordsCellular Network Telecommunication Network Cryptographic Algorithm Multimedia Messaging Service User Tracking
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Unable to display preview. Download preview PDF.
© Springer Science+Business Media, LLC 2008