1 code implementation • 26 Oct 2015 • Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, Jean-Pierre Seifert
We carefully analyzed LTE access network protocol specifications and uncovered several vulnerabilities.
Cryptography and Security