GSM Security 2
On the previous article on GSM security here. We have briefly discussed about the network element and the network architecture of GSM, including the encryption that are widely used in GSM network. At the end of that article as we have discussed about how the network identify the SIM (Subscriber identity module), this is an […]