Title: |
Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging |
Article URLs: |
|
Alternative Article URLs: |
|
Authors: |
Chunyi Peng |
-
The Ohio State University
|
Chi-Yu Li |
-
University of California, Los Angeles
|
Hongyi Wang |
-
University of California, Los Angeles
|
Guan-Hua Tu |
-
University of California, Los Angeles
|
Songwu Lu |
-
University of California, Los Angeles
|
Sharing: |
Unknown
|
Verification: |
Authors have
not verified
information
|
Artifact Evaluation Badge: |
none
|
Artifact URLs: |
|
Artifact Correspondence Email Addresses: |
|
NSF Award Numbers: |
1421933,
1422835
|
DBLP Key: |
conf/ccs/PengLWTL14
|
Author Comments: |
|