Full metadata record
DC FieldValueLanguage
dc.contributor.authorLin, Yi-Bingen_US
dc.contributor.authorTsai, Meng-Hsunen_US
dc.date.accessioned2014-12-08T15:13:09Z-
dc.date.available2014-12-08T15:13:09Z-
dc.date.issued2007-11-01en_US
dc.identifier.issn0018-9545en_US
dc.identifier.urihttp://dx.doi.org/10.1109/TVT.2007.901060en_US
dc.identifier.urihttp://hdl.handle.net/11536/10140-
dc.description.abstractMobile telecommunication services have become very popular recently, and many people bring mobile phones with them wherever they go. However, we observe that mobile phones can be modified to become remote microphones for eavesdropping. The eavesdropping technique only requires modifications to the mobile phone to be spied on and does not require any network changes. This paper describes mobile-phone eavesdropping and analyzes how serious it can be. Based on our study, we provide suggestions to avoid being eavesdropped upon.en_US
dc.language.isoen_USen_US
dc.subjecteavesdroppingen_US
dc.subjectsession initiation protocol (SIP)en_US
dc.subjectsignaling system number 7 (SS7)en_US
dc.subjectvoice over IP (VoIP)en_US
dc.titleEavesdropping through mobile phoneen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/TVT.2007.901060en_US
dc.identifier.journalIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGYen_US
dc.citation.volume56en_US
dc.citation.issue6en_US
dc.citation.spage3596en_US
dc.citation.epage3600en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000251192000035-
dc.citation.woscount1-
Appears in Collections:Articles


Files in This Item:

  1. 000251192000035.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.