2019 International Conference on Information Science and Communications Technologies (ICISCT) 2019
DOI: 10.1109/icisct47635.2019.9012000
|View full text |Cite
|
Sign up to set email alerts
|

Principle Of Organizing Database Identification On Mobile Devices By Imei

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Then they talk of a changed bank account where the victim should send money to [15]. If the identity card used in SIM card registration is nonexistent, it becomes hard to trace them [16]. However, such situations, where non-existent identity cards are used to register SIM cards, become conducive for fraudsters to create emails and do their activities for sometime.…”
Section: B Creating Fraudulent Emailmentioning
confidence: 99%
“…Then they talk of a changed bank account where the victim should send money to [15]. If the identity card used in SIM card registration is nonexistent, it becomes hard to trace them [16]. However, such situations, where non-existent identity cards are used to register SIM cards, become conducive for fraudsters to create emails and do their activities for sometime.…”
Section: B Creating Fraudulent Emailmentioning
confidence: 99%
“…Then they talk of a changed bank account where the victim should send money to [15]. If the identity card used in SIM card registration is nonexistent, it becomes hard to trace them [16]. However, such situations, where non-existent identity cards are used to register SIM cards, become conducive for fraudsters to create emails and do their activities for sometime.…”
Section: B Creating Fraudulent Emailmentioning
confidence: 99%
“…Before choosing an eNB LTE base station, you need to consider whether other equipment supports other mobile communication standards [34], [35]. We also need to remember the planned output power of the TRX transceiver and other technical properties [36]. It is supposed to use the Flexi Multiradio base station as radio access equipment.…”
Section: B the Choice Of Lte Network Base Station Equipmentmentioning
confidence: 99%