P. Burge |
"Frameworks for Fraud Detection in Mobile Telecommunication Networks",
Mobile and Personal Communication Seminar, Limerick Ireland, 06/06/96. |
P. Burge et al |
"Fraud detection and management in mobile telecommunication networks",
2nd European Conference on Security & Detection - ECOS, Proceedings
of the 2nd European Conference on Security and Detection, IEE Conference
publication 437, pp. 91-96, London, 28/04/97. |
P. Burge |
"Detecting Cellular Fraud Using Adaptive Prototypes", AAAI-97 Workshop
on AI - Approaches to Fraud Detection and Risk Management, Rhode Island,
27/07/97. |
P. Burge et al |
"BRUTUS - A Hybrid Detection Tool", ACTS Mobile Summit 97, Proceedings
of ACTS Mobile Summit 97, pp. 722-727, Aalborg, 07/10/97. |
L. Chen, D. Gollmann, C.J. Mitchell |
"Key escrow in Mutually Mistrusting Environments", Cambridge Workshop
on Security Protocols, Lecture Notes in Computer Science, 1189, Cambridge
UK, 10-12/04/96. |
L. Chen, D. Gollmann, C.J. Mitchell |
"Tailoring Authentication Protocols to Underlying Mechanisms", ACISP'96,
Australian Conference on Information Security and Privacy, LNCS 1172, Wollongong
NSW, 24-26/06/96. |
J. Degraeve et al. |
"Migration/Evolution Towards UMTS - Security Issues", ACTS Mobile Summit,
Granada Spain, 27/11/96. |
J.C. Francis, H. Herbrig, N. Jefferies |
"Secure provision of UMTS services over diverse access networks", IEEE
Communications Magazine 36:2, February 1998, pp132-136. |
B. Franco |
"Demonstration of UMTS authentication", 2nd International Distributed
Conference on Network Interoperability, pp. 715-721, Madeira, 16/06/97. |
B. Franco |
"Demonstration of the authentication framework for UMTS", 4th International
symposium on Communication Theory and applications, Ambleside, 13/07/97. |
B. Franco |
"Authentication for UMTS: Description of trial", EPMCC 97, Proceedings,
ITG-Fachbericht 145, pp. 351-358, Bonn, 30/09/97. |
P. Gosset and M. Hyland |
"Classification, Detection and Prosecution of Fraud on Mobile Networks", Proceedings of the 4th ACTS Mobile
Communications Summit, Sorrento, June 1999 |
H.-J. Hitz and G. Horn |
"Sicheres bezahlen fuer informationdienste in zukuenftigen mobilnetzen",
Proceedings of SIS'98, Stuttgart, 26-27 Maerz, 1998, vdf-Verlag, S. pp.
349-370 (in German). |
G. Horn and B. Preneel |
"Authentication and payment in future mobile systems", Computer Security
- ESORICS'98, Lecture Notes in Computer Science, 1485, pp. 277-293, 1998. |
G. Horn et al |
"The Use of Trusted Third Parties and Secure Billing in UMTS", ACTS
Mobile Summit, Granada Spain, 27/11/96. |
G. Horn et al |
"Trialling secure billing with trusted third party support for UMTS
applications", Proceedings of the 3rd ACTS Mobile Communications Summit,
Rhodes, June 1998, pp574-579. |
N. Jefferies |
"Optimising enhanced mobile services by incorporating IN functionality
into the SIM card", Implementing IN to Optimise Mobile Networks, London,
30/06/97. |
N. Jefferies |
"Securing the future for mobile communications", Proceedings of the 4th ACTS Mobile
Communications Summit, Sorrento, June 1999 |
L. R. Knudsen and T. P. Pedersen |
"On the Difficulty of Software Key Escrow" |
M. Lapere |
"User authentication in mobile telecommunication environments using
voice biometrics and smart cards", 4th International Conference on Intelligence
in Services and Networks, IS&N'97, Lecture Notes in Computer Science,
1238, pp. 437-444, Cernobbio, 27/05/97. |
S. Manning |
"An update on the latest telecommunications standards for the GSM SIMs",
Cards North Asia 97, Hong Kong, 20/11/97. (slides) |
K.M. Martin |
"Increasing efficiency of international key escrow in mutually mistrusting
domains", 6th IMA Conference on Cryptography and Coding, Lecture Notes
in Computer Science, 1355, pp. 221-232, Cirencester, 1997. |
K.M. Martin |
"Applying Cryptography within the ASPeCT Project", Information Security
Technical Report (1998) Vol. 2 No. 4 pp.41-53. |
K.M. Martin and C.J. Mitchell |
"Analysis of hash function of Yi and Lam", Electronics Letters (1998),
Vol.34, No.24, pp.2327-2328. |
K.M. Martin et al. |
"Secure billing for mobile information services in UMTS", Intelligence
in Services and Networks: Technology for Ubiquitous Telecom Services, 5th
International Conference on Intelligence in Services and Networks, IS&N
'98 Antwerp, Belgium, May 1998. LNCS 1430, Springer, 1998, pp535-548. |
C.J. Mitchell and L. Chen |
"Comments on the Secret Key User Authentication Scheme", Operating
Systems Review, Vol. 30 No. 4, 10/96. |
Y. Moreau et al |
"Novel Techniques for Fraud Detection in Mobile Telecommunication Networks",
ACTS Mobile Summit, Granada, Spain, 27/11/96. |
Y. Moreau, H. Verrelst and J. Vandewalle |
"Fraud detection in mobile communications using supervised neural networks",
Proceedings of SNN'97: Europe's Best Neural Networks Practice, World Scientific,
Amsterdam, May 1997. |
Y. Moreau, H. Verrelst and J. Vandewalle |
"Detection of mobile phone fraud using supervised neural networks:
a first prototype", International Conference on Artificial Neural Networks
97, Lecture Notes in Computer Science, 1327, pp. 1065-1070, Lausanne, 1997. |
B. Preneel |
"On the security of two MAC algorithms", Eurocrypt'96, LNCS 1070, pp.
19-32, Zaragoza Spain, 12-16/05/96. |
K. Rantos and C. Mitchell |
"Key Recovery in ASPeCT Authentication and Initialisation of Payment Protocol", Proceedings of the 4th ACTS Mobile
Communications Summit, Sorrento, June 1999 |
G. Vanneste |
"ASPeCT UMTS authentication and UIM trial", IS&N'98, Antwerp, May
1998 (slides). |
G. Vanneste, N. Jefferies, E. Johnson |
"UMTS benefiting from public-key authentication", Proceedings of the
3rd ACTS Mobile Communications Summit, Rhodes, June 1998, pp. 185-190. |