no code implementations • 20 Apr 2024 • Dave Kleidermacher, Emmanuel Arriaga, Eric Wang, Sebastian Porst, Roger Piqueras Jover
In this paper, we explore the challenges of ensuring security and privacy for users from diverse demographic backgrounds.
1 code implementation • 18 Jul 2016 • Roger Piqueras Jover
Implementation results are discussed from the actual deployment of LTE rogue base stations, IMSI catchers and exploits that can potentially block a mobile device.
Cryptography and Security