Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, Jean-Pierre Seifert: Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems. arXiv:1510.07563 [cs], 26.10.2015. doi:10.14722/ndss.2016.23236Artikkelin verkkoversio. (englanniksi)
Jorgen Cederlof, Jan-Ake Larsson: Security aspects of the Authentication used in Quantum Cryptography. arXiv:quant-ph/0611009, 28.9.2006, s. 63990H. doi:10.1117/12.689682Artikkelin verkkoversio. (englanniksi)
Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, Jean-Pierre Seifert: Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems. arXiv:1510.07563 [cs], 26.10.2015. doi:10.14722/ndss.2016.23236Artikkelin verkkoversio. (englanniksi)
B. Aziz, G. Hamilton: Detecting Man-in-the-Middle Attacks by Precise Timing. 2009 Third International Conference on Emerging Security Information, Systems and Technologies, kesäkuu 2009, s. 81–86. doi:10.1109/SECURWARE.2009.20Artikkelin verkkoversio. (englanniksi)
Jorgen Cederlof, Jan-Ake Larsson: Security aspects of the Authentication used in Quantum Cryptography. arXiv:quant-ph/0611009, 28.9.2006, s. 63990H. doi:10.1117/12.689682Artikkelin verkkoversio. (englanniksi)
ieee.org
ieeexplore.ieee.org
B. Aziz, G. Hamilton: Detecting Man-in-the-Middle Attacks by Precise Timing. 2009 Third International Conference on Emerging Security Information, Systems and Technologies, kesäkuu 2009, s. 81–86. doi:10.1109/SECURWARE.2009.20Artikkelin verkkoversio. (englanniksi)