Multi Service Proxy: Mobile Web Traffic Entitlement Point in 4G Core Network
Abstract
Full Text:
PDFReferences
Cisco Visual Networking Index: Forecast and Methodology, 2013.
http://www:cisco:com/c/en/us/solutions/collateral/service-provider/ipngn-
ip-next-generation-network/white paper c11-481360:html/
G. Maier, A. Feldmann, V. Paxson, and M. Allman, On dominant characteristics of residential broadband internet traffic, in Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, ser. IMC 09. New York, NY, USA: ACM, 2009, pp. 90-102.
C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, and F.
Jahanian, Internet Inter-Domain Traffic, in Proc. of the ACM SIGCOMM
Conference on SIGCOMM, New Delhi, India, Aug. 2010.
J. Erman, A. Gerber, M. T. Hajiaghayi, D. Pei, and O. Spatscheck,
Network-Aware Forward Caching, in WWW. ACM, 2009, pp. 291 300.
A. Kalgaonkar: ATT Matrix 1.0 Project - Workflow Scripts Administration Guide, 2013.
Apple Inc., iOS Security - White Paper, 2015.
Wikipedia contributors. ”Public-key cryptography.” Wikipedia, The Free Encyclopedia. 2015.
C. Timberg: ”Huge flaw that undermines privacy of mobile phone
networks revealed by German researchers”, Washington Post, 2014.
F. Herrgoss, Gus Bourg, Kieran Kavanagh: Calico 2.3, 2011.
I. Ristic, Is BEAST Still a Threat?, Qualys Blog, 2013. Available
from: https://community:qualys:com/blogs/securitylabs/2013/09/10/
is-beast-still-a-threat
M. Ray, Understanding the TLS Renegotiation Attack, Educated Guesswork, 2009. Available from: http://www:educatedguesswork:org/2009/11/
understanding the tls renegoti:html
H. Zhang, Three attacks in SSL protocol and their solutions, University of Auckland, 2011. Available from: https://www:cs:auckland:ac:nz/
courses/compsci725s2c/archive/termpapers/725zhang:pdf
B. Maller, T. Duong, K. Kotowicz, This POODLE Bites: Exploiting The SSL 3.0 Fallback Security Advisory, Google, 2014.
J. Lv, B. Zhang, D. Lin, Distinguishing Attacks on RC4 and A New
Improvement of the Cipher, 2013. Available from: https://eprint:iacr:org/
/176:pdf
A. Borges, How to perform a Heartbleed Attack, 2014. Available from:
http://alexandreborgesbrazil:files:wordpress:com/2014/04/heartbleed
article rev b:pdf
DOI: http://dx.doi.org/10.11601/ijates.v4i2.109
Refbacks
- There are currently no refbacks.