http://iet.metastore.ingenta.com
1887

IEE Seminar Secure GSM and Beyond: End to End Security for Mobile Communications

Buy conference proceeding
$78.00
(plus tax if applicable)
  • Location: London, UK
  • Conference date: 11 Feb. 2003
  • Conference number: 2003/10059
  • The following topics are dealt with: interoperability and international operation; data bearer performance characterisation for wide area mobile networks; secure voice over GSM; extending 2G end-to-end security solutions to 3G networks; end to end encryption in GSM, DECT and satellite networks using NSK200; multiple bearer networks; public safety TETRA networks; smart card based security for TETRA radio networks; forensic extraction of electronic evidence; secure content distribution; enterprise mobile solution; threat model for mobile ad hoc networks; agent system security; PKE for sensitive mobile applications.

18 items found

  • Interoperability and international operation: an introduction to end to end mobile security
  • Next generation networks security: convergence or conversion, outline of threats and countermeasures in provision of end-to-end security
  • Secure content distribution to mobile users
  • The deployment of a secure `outside-in' enterprise mobile solution
  • A threat model for mobile ad hoc networks
  • Secure voice service MW 3026 S & MW 3026 S-MR, C500, Amadeus station
  • Datafreeze® - using location services to encrypt mobile telecommunications
  • Agent system security
  • Interoperability issues for end to end security: the IP Federating Network (IPFN) for digital secured mobile networks
  • PKE for sensitive mobile applications. An implementation of TLS 1.0 (RFC 2246)
  • End to end data bearer performance characterisation for communications over wide area mobile networks
  • Secure voice over GSM and other low bit rate systems
  • Extending 2G end-to-end security solutions to 3G networks
  • End to end encryption in GSM, DECT and satellite networks using NSK200
  • End-to-end encryption across multiple bearer networks
  • End to end encryption in public safety TETRA networks
  • Smart card based end-to-end security for TETRA radio networks
  • Forensic extraction of electronic evidence from GSM mobile phones
Items per page 20 | 50 | 100
This is a required field
Please enter a valid email address