Cryptoanalysis_of_ORYX_by_Wagner.pdf Authentication_and_Security_in_Mobile_by_Greg_Rose.pdf CDMA2000_security_overview_by_QUALCOMM.pdf CDMA2000_security_overview_by_Rahul_Chauhan.pdf CDMA2000_technology_by_Amit_Balani.pdf