| Title: |
Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging |
| Article URLs: |
|
| Alternative Article URLs: |
|
| Authors: |
Chunyi Peng |
-
The Ohio State University
|
| Chi-Yu Li |
-
University of California, Los Angeles
|
| Hongyi Wang |
-
University of California, Los Angeles
|
| Guan-Hua Tu |
-
University of California, Los Angeles
|
| Songwu Lu |
-
University of California, Los Angeles
|
| Sharing: |
Unknown
|
| Verification: |
Authors have
not verified
information
|
| Artifact Evaluation Badge: |
none
|
| Artifact URLs: |
|
| Artifact Correspondence Email Addresses: |
|
| NSF Award Numbers: |
1421933,
1422835
|
| DBLP Key: |
conf/ccs/PengLWTL14
|
| Author Comments: |
|