Research on end-to-end encryption of TETRA

被引:1
|
作者
Beijing FORICH Software Technology Co. Ltd., Network Security Division, Beijing 100083, China [1 ]
不详 [2 ]
机构
来源
J. China Univ. Post Telecom. | 2006年 / 2卷 / 70-73期
关键词
D O I
10.1016/S1005-8885(07)60107-1
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] End-to-End Encryption in Resource-Constrained IoT Device
    Alluhaidan, Ala Saleh D.
    Prabu, P.
    IEEE ACCESS, 2023, 11 : 70040 - 70051
  • [22] Securing SCADA Applications Using OpenPLC With End-To-End Encryption
    Alves, Thiago
    Morris, Thomas
    Yoo, Seong-Moo
    3RD ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2017), 2017, : 1 - 6
  • [23] End-to-end Encryption for SMS Messages in the Health Care Domain
    Hassinen, Marko
    Laitinen, Pertti
    CONNECTING MEDICAL INFORMATICS AND BIO-INFORMATICS, 2005, 116 : 316 - 321
  • [24] Novel end-to-end voice encryption method in GSM system
    Qi, H. F.
    Yang, X. H.
    Jiang, R.
    Liang, B.
    Zhou, S. J.
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 217 - 220
  • [25] Towards Efficient End-to-End Encryption for Container Checkpointing Systems
    Stoyanov, Radostin
    Reber, Adrian
    Ueno, Daiki
    Clapinski, Michal
    Vagin, Andrei
    Bruno, Rodrigo
    PROCEEDINGS OF THE 15TH ACM SIGOPS ASIA-PACIFIC WORKSHOP ON SYSTEMS, APSYS 2024, 2024, : 60 - 66
  • [26] Integrating end-to-end encryption and authentication technology into broadband networks
    Pierson, LG
    INTEGRATION ISSUES IN LARGE COMMERCIAL MEDIA DELIVERY SYSTEMS, 1996, 2615 : 260 - 269
  • [27] Usability of End-to-End Encryption in E-Mail Communication
    Reuter, Adrian
    Abdelmaksoud, Ahmed
    Boudaoud, Karima
    Winckler, Marco
    FRONTIERS IN BIG DATA, 2021, 4
  • [28] Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE
    Isobe, Takanori
    Minematsu, Kazuhiko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 313 - 324
  • [29] Scalable, Practical VoIP Teleconferencing With End-to-End Homomorphic Encryption
    Rohloff, Kurt
    Cousins, David Bruce
    Sumorok, Daniel
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) : 1031 - 1041
  • [30] Blockchain-enabled End-to-End Encryption for Instant Messaging Applications
    Singh, Raman
    Chauhan, Ark Nandan Singh
    Tewari, Hitesh
    2022 IEEE 23RD INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM 2022), 2022, : 501 - 506