Back to Results
First PageMeta Content
Broadband / Digital Enhanced Cordless Telecommunications / Software-defined radio / DECT Standard Cipher / Authenticated encryption / Block cipher / Initialization vector / Cipher / European Telecommunications Standards Institute / Cryptography / Block cipher modes of operation / Message authentication codes


EN[removed]V2[removed]Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features
Add to Reading List

Document Date: 2013-08-27 07:30:01


Open Document

File Size: 782,23 KB

Share Result on Facebook

Country

France / /

/

IndustryTerm

printing / Terminal equipment / security algorithms / security services / /

/

ProvinceOrState

Kansas / /

Technology

encryption / 4.1 Encryption / ISDN / 66 Encryption / 9.6 Encryption / PSTN / 11.6 Encryption / 4.3 Encryption / DSAA2 algorithm / security algorithms / GSM / TDMA / public key / 5.4 Access-rights protocols / 4.5 Encryption / 52 Encryption / 42 CCM algorithm / 50 Encryption / X.25 / 11.4 Encryption / 37 CCM Authenticated Encryption / 6.2 CCM Authenticated Encryption / 4.2 Encryption / PBX / 116 E.2 Protocol / DSAA algorithm / 4.4 Encryption / 67 Encryption / PDF / 38 Algorithms / 7 F.1.3 F.2 Mechanism/algorithm / 9.4 Encryption / 56 Encryption / /

URL

http /

SocialTag