[1] 谷利泽, 郑世慧, 杨义先. 现代密码学教程[M]. 北京:北京邮电大学出版社,2013:218-219.[2] Briceno M, Goldberg I, Wagner D. Apedagogical implementation of the GSM A5/1 and A5/2 "voice privacy" encryption algorithms [EB/OL]. (1999) [2014-03-30].http://cryptome.org/gsm-a512.htm.[3] Barkan E, Biham E, Keller N. Instant ciphertext-only cryptanalysis of GSM encrypted communication [J]. Lecture Notes in Computer Science, 2003:600-616.[4] Harb H, Farahat H, Ezz. SecureSMSPay: secure SMS mobile payment model [C]//2nd International Conference on Anti-counterfeiting, Security and Identification, ASID. Guiyang, China, 2008: 11-17.[5] Hussain I M, Ajmal A. SMS Security based on 2-way handshaking method using data hiding algorithm[J]. International Journal of Electronics, Computer and Communications Technologies, 2013, 3(4): 26-33.[6] Lisonek D, Drahansky M.SMS encryption for mobile communication [C]//International Conference on Security Technology. Hainan Island, 2008: 198-201.[7] Albuja J P, Carrera E V. Trusted SMS communication on mobile devices [C]//11th Brazilian Workshop on Real-Time and Embedded Systems. Pernambuco, Brazil, 2009:165-170.[8] 隋爱芬, 杨义先. 第三代移动通信系统的安全[J]. 世界电信, 2004, 16(5): 37-40.[9] Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems [C]//Proceedings of the 16th ACM Conference on Computer and Communications Security. 1978, 21(2):120-126.[10] William S.Cryptography and network security: principles and practice [M]. Prentice Hall,2010:320-321. |