summaryrefslogtreecommitdiffstats
path: root/Tex/Master/Master.aux
diff options
context:
space:
mode:
authorTom2012-01-18 13:29:22 +0100
committerTom2012-01-18 13:29:22 +0100
commite50d19c3da1a71c0d3577e8dae8feec8b83fd10b (patch)
treef94db373f201dad19aecea0e6054eb8228e27bb9 /Tex/Master/Master.aux
parentVLR and EIR finished (diff)
downloadimsi-catcher-detection-e50d19c3da1a71c0d3577e8dae8feec8b83fd10b.tar.gz
imsi-catcher-detection-e50d19c3da1a71c0d3577e8dae8feec8b83fd10b.tar.xz
imsi-catcher-detection-e50d19c3da1a71c0d3577e8dae8feec8b83fd10b.zip
authentication center added
Diffstat (limited to 'Tex/Master/Master.aux')
-rw-r--r--Tex/Master/Master.aux67
1 files changed, 33 insertions, 34 deletions
diff --git a/Tex/Master/Master.aux b/Tex/Master/Master.aux
index de58195..a37b9d7 100644
--- a/Tex/Master/Master.aux
+++ b/Tex/Master/Master.aux
@@ -53,12 +53,12 @@
\citation{GSM_history2011}
\citation{GSM_stats2011}
\citation{3gpp_Proposal2000}
-\@writefile{lof}{\contentsline {figure}{\numberline {\relax 2.1}{\ignorespaces Growth of mobile GSM subscriptions. Compiled from \cite {GSM2009,GSM_history2011,GSM_stats2011}}}{4}}
-\newlabel{fig:gsm_growth}{{\relax 2.1}{4}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.1}{\ignorespaces Growth of mobile GSM subscriptions. Compiled from \cite {GSM2009,GSM_history2011,GSM_stats2011}}}{4}}
+\newlabel{fig:gsm_growth}{{2.1}{4}}
\citation{hsdpa}
\citation{hsupa}
\citation{kommsys2006}
-\@writefile{lof}{\contentsline {figure}{\numberline {\relax 2.2}{\ignorespaces The 3GPP Logo}}{5}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.2}{\ignorespaces The 3GPP Logo}}{5}}
\FN@pp@footnote@aux{1}{5}
\@writefile{toc}{\contentsline {section}{\numberline {2.2}The GSM Network}{5}}
\newlabel{sec:network}{{2.2}{5}}
@@ -66,18 +66,17 @@
\citation{GSM2009}
\citation{overview1994}
\citation{overview1996}
-\@writefile{lof}{\contentsline {figure}{\numberline {\relax 2.3}{\ignorespaces The main components of a GSM network.}}{6}}
-\newlabel{fig:gsm_network}{{\relax 2.3}{6}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.3}{\ignorespaces The main components of a GSM network.}}{6}}
+\newlabel{fig:gsm_network}{{2.3}{6}}
\FN@pp@footnote@aux{2}{6}
\citation{GSM0207}
\citation{protocols1999}
-\@writefile{lof}{\contentsline {figure}{\numberline {\relax 2.4}{\ignorespaces Evolution of mobile phones over the last decades.}}{7}}
-\newlabel{fig:phones}{{\relax 2.4}{7}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.4}{\ignorespaces Evolution of mobile phones over the last decades.}}{7}}
+\newlabel{fig:phones}{{2.4}{7}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Mobile Station}{7}}
\newlabel{sec:ms}{{2.2.1}{7}}
\FN@pp@footnote@aux{3}{7}
\FN@pp@footnote@aux{4}{7}
-\FN@pp@footnote@aux{5}{7}
\citation{GSM0505}
\citation{ISO7810}
\citation{protocols1999}
@@ -85,12 +84,12 @@
\citation{kommsys2006}
\citation{GSM23003}
\citation{ITU212}
-\@writefile{lof}{\contentsline {figure}{\numberline {\relax 2.5}{\ignorespaces Structure of the IMSI.}}{8}}
-\newlabel{fig:IMSI}{{\relax 2.5}{8}}
-\@writefile{lot}{\contentsline {table}{\numberline {\relax 2.1}{\ignorespaces Subset of data stored on a SIM card. Adopted from \cite {protocols1999}}}{9}}
-\newlabel{tab:simdata}{{\relax 2.1}{9}}
-\@writefile{lot}{\contentsline {table}{\numberline {\relax 2.2}{\ignorespaces Mobile Country and Network Codes. (R) denotes that the MCC is reserved but not operational as of yet, whereas (T) denotes a operational test network.}}{10}}
-\newlabel{tab:countrycodes}{{\relax 2.2}{10}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.5}{\ignorespaces Structure of the IMSI.}}{8}}
+\newlabel{fig:IMSI}{{2.5}{8}}
+\@writefile{lot}{\contentsline {table}{\numberline {2.1}{\ignorespaces Subset of data stored on a SIM card. Adopted from \cite {protocols1999}}}{9}}
+\newlabel{tab:simdata}{{2.1}{9}}
+\@writefile{lot}{\contentsline {table}{\numberline {2.2}{\ignorespaces Mobile Country and Network Codes. (R) denotes that the MCC is reserved but not operational as of yet, whereas (T) denotes a operational test network.}}{10}}
+\newlabel{tab:countrycodes}{{2.2}{10}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Basestation Subsystem}{10}}
\newlabel{sec:bss}{{2.2.2}{10}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Network Subsystem}{10}}
@@ -99,25 +98,26 @@
\@writefile{toc}{\contentsline {subsubsection}{Mobile Switching Center}{11}}
\@writefile{toc}{\contentsline {subsubsection}{Home Location Register}{11}}
\@writefile{toc}{\contentsline {subsubsection}{Visitor Location Register}{11}}
-\citation{GSM23078}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.6}{\ignorespaces Authentication procedure}}{12}}
+\newlabel{fig:authentication}{{2.6}{12}}
\@writefile{toc}{\contentsline {subsubsection}{Equipment Identification Register}{12}}
+\FN@pp@footnote@aux{5}{12}
\@writefile{toc}{\contentsline {subsubsection}{Authentication Center}{12}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Intelligent Network}{12}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}The Cellular Principle}{13}}
-\@writefile{toc}{\contentsline {section}{\numberline {2.3}The $U_m$ Interface}{13}}
-\newlabel{sec:Um}{{2.3}{13}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Interfaces}{13}}
-\newlabel{sec:interfaces}{{2.3.1}{13}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}Layers}{13}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.3}The Radio Channel}{13}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.4}Logical Channels}{13}}
-\@writefile{toc}{\contentsline {section}{\numberline {2.4}IMSI-Catcher}{13}}
-\newlabel{sec:catcher}{{2.4}{13}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}Mode of Operation}{13}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.2}Possible Attacks}{13}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.3}Law situation in Germany}{13}}
-\FN@pp@footnotehinttrue
-\FN@pp@footnotehinttrue
+\citation{GSM23078}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Intelligent Network}{13}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.5}The Cellular Principle}{14}}
+\@writefile{toc}{\contentsline {section}{\numberline {2.3}The $U_m$ Interface}{14}}
+\newlabel{sec:Um}{{2.3}{14}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Interfaces}{14}}
+\newlabel{sec:interfaces}{{2.3.1}{14}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}Layers}{14}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.3}The Radio Channel}{14}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.4}Logical Channels}{14}}
+\@writefile{toc}{\contentsline {section}{\numberline {2.4}IMSI-Catcher}{14}}
+\newlabel{sec:catcher}{{2.4}{14}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}Mode of Operation}{14}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.2}Possible Attacks}{14}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.3}Law situation in Germany}{14}}
\FN@pp@footnotehinttrue
\bibstyle{acm}
\citation{*}
@@ -135,10 +135,9 @@
\bibcite{overview1994}{11}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
+\FN@pp@footnotehinttrue
+\FN@pp@footnotehinttrue
\@writefile{toc}{\contentsline {chapter}{Bibliography}{I}}
-\@writefile{lof}{\addvspace {10\p@ }}
-\@writefile{lot}{\addvspace {10\p@ }}
-\@writefile{lol}{\addvspace {10\p@ }}
\bibcite{protocols1999}{12}
\bibcite{hsdpa}{13}
\bibcite{hsupa}{14}