Research on end-to-end encryption of TETRA

被引:1
|
作者
Beijing FORICH Software Technology Co. Ltd., Network Security Division, Beijing 100083, China [1 ]
不详 [2 ]
机构
来源
J. China Univ. Post Telecom. | 2006年 / 2卷 / 70-73期
关键词
D O I
10.1016/S1005-8885(07)60107-1
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Research on End-to-End Encryption of TETRA
    ZHANG Zhi-hui 1
    2.Information Security Center
    The Journal of China Universities of Posts and Telecommunications, 2006, (02) : 70 - 73
  • [2] SDNS ARCHITECTURE AND END-TO-END ENCRYPTION
    NELSON, R
    HEIMANN, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 356 - 366
  • [3] A European right to end-to-end encryption?
    Shurson, Jessica
    COMPUTER LAW & SECURITY REVIEW, 2024, 55
  • [4] Anonymous Traceback for End-to-End Encryption
    Kenney, Erin
    Tang, Qiang
    Wu, Chase
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 42 - 62
  • [5] Subverting Telegram's End-to-End Encryption
    Cogliati, Benoit
    Ethan, Jordan
    Jha, Ashwin
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (01) : 5 - 40
  • [6] System of end-to-end symmetric database encryption
    Galushka, V. V.
    Aydinyan, A. R.
    Tsvetkova, O. L.
    Fathi, V. A.
    Fathi, D. V.
    INTERNATIONAL CONFERENCE INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY 2018, PTS 1-4, 2018, 1015
  • [7] On Track of Sigfox Confidentiality with End-to-End Encryption
    Fujdiak, Radek
    Blazek, Petr
    Mikhaylov, Konstantin
    Malina, Lukas
    Mlynek, Petr
    Misurec, Jiri
    Blazek, Vojtech
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [8] Mitigation of Attacks on Email End-to-End Encryption
    Schwenk, Joerg
    Brinkmann, Marcus
    Poddebniak, Damian
    Mueller, Jens
    Somorovsky, Juraj
    Schinzel, Sebastian
    CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1647 - 1664
  • [9] SafeSMS - End-to-end encryption for SMS messages
    Hassinen, M
    ConTEL 2005: Proceedings of the 8th International Conference on Telecommunications, Vols 1 and 2, 2005, : 359 - 365
  • [10] End-to-End Encryption for Personal Telehealth Systems
    Oellerer, Gerald
    Mense, Alexander
    PHEALTH 2014, 2014, 200 : 140 - 145