1 |
https://en.wikipedia.org/wiki/Lawful_interception
|
2 |
M. Gorge "Lawful interception key concepts, actors, trends and best practice considerations," Elsevier Computer Fraud & Security, vol. 2007, no 9, pp. 10-14, Sep. 2007.
|
3 |
Cable Television Laboratories, "PacketCable Electronic Surveillance Specification," PKT-SP-ES-DCI-101-060914, pp. 17-45, June 2006.
|
4 |
H. Labiod and M. Badra: New Technologies, Mobility and Security, Springer, pp. 207-216, May 2007.
|
5 |
ETSI, "Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic," TS 101 671 v3.12.1, Oct. 2013.
|
6 |
ETSI, "Telecommunications Security; Lawful Interception (LI); Issues on IP interception," TR 101 944, May 2001.
|
7 |
UK Home Office, "National Handover Interface Specification version 1.0," May 2002.
|
8 |
http://www.calea.org/Online/AnnualReports/annualreports.htm
|
9 |
Congress of the United States of America, "Communications Assistance for Law Enforcement Act of 1994 (CALEA)," Pub. L. No. 103-414, 108 Stat. 4279, Oct. 1994.
|
10 |
ETSI, "Lawful Interception(LI); Dynamic Triggering of Content of Communication Interception," DTS 102 677 v0.2.2, Dec. 2009.
|
11 |
ETSI, "Lawful Interception (LI); Handover and Service-Specific Details(SSD) for IP delivery," TS 102 232 v3.4.1, Oct. 2014.
|
12 |
ETSI, "Lawful Interception requirements for GSM; Interception domain Architecture for IP networks," TR 528 v1.1.1, Oct. 2006.
|
13 |
S.M. Faccin, P. Lalwaney and B. Patil, "IP multimedia services: analysis of mobile IP and SIP interactions in 3G networks," IEEE Communications Magazine, 42(1), pp.113-120, Jan. 2004.
DOI
|
14 |
M. Lee, T. Lee, B. Yoon, H. Kim and H. P. In, "A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks," Journal of Communications and Networks, vol.11, no.6, pp.626-633, Dec. 2009.
DOI
|