@dblp

Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery.

, , and . SecureComm, page 1-10. IEEE, (2006)

Links and resources

Tags