Author of the publication

Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access.

, , , and . TrustCom/BigDataSE/ISPA (1), page 1171-1176. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interconnection Security Standards - We Are All Connected.. J. ICT Stand., 4 (1): 1-18 (2016)Enabling Technologies for Mobile Services: The MobiLife Book, , , , , , , , , and 6 other author(s). chapter 6. Privacy, Trust and Group Communications, John Wiley & Sons, (October 2007)Experiences in Trusted Cloud Computing., , and . J. ICT Stand., 6 (3): 263-278 (2018)Roaming Interface Signaling Security for LTE Networks., , and . SecITC, volume 11359 of Lecture Notes in Computer Science, page 204-217. Springer, (2018)Providing for privacy in a network infrastructure protection context., and . ICIN, page 79-86. IEEE, (2017)Mobile Payment Solutions., and . I3E, volume 202 of IFIP Conference Proceedings, page 629-642. Kluwer, (2001)Context-aware Group Management in Mobile Environments, , , , , , , , , and 2 other author(s). Proceedings of the 14th IST Mobile & Wireless Communications Summit, page 1-6. Dresden, Germany, (June 2005)Context-aware Group Management in Mobile Environments, , , , , , , , , and 2 other author(s). IST Summit 2005, Dresden, (2005)We know where you are!, , , and . CyCon, page 277-293. IEEE, (2016)User location tracking attacks for LTE networks using the interworking functionality., , and . Networking, page 315-322. IEEE Computer Society, (2016)