Mobile phones: the next frontier for hackers?

N. Leavitt
2005 Computer  
doi:10.1109/mc.2005.134 fatcat:alg67jwdyzf3zlgckt4odhrryq