ETS 300 841 - Edition 01 - Telecommunications Security; Integrated Services Digital Network (ISDN); Encryption key management and authentication system for audiovisual services

ثبت نشده
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Telecommunications and Network Security

The CIA TRIAD The following is how to preserve the CIA triad in the telecommunications and network security domain: Confidentiality – Network Security Protocols – Network authentication services – Data Encryption Services Integrity-Firewall Services-Communications Security Management-IDS's Availability-Fault tolerance for data availability, such as backups and redundant disk systems-Acceptable ...

متن کامل

Authentication protocols for the broadband ISDN billing system

Ž . The broadband integrated services digital network B-ISDN offers a wide variety of services to its customers. From both provider’s and user’s perspective, a fair and flexible billing system is indispensable to the operation of B-ISDN. In this paper, we discuss different billing policies, and their corresponding authentication protocols, which can be used by the B-ISDN billing system. Flat ra...

متن کامل

Security Upgrade of Existing ISDN Devices by Using Reconfigurable Logic

Integrated Services Digital Network (ISDN) is a de facto worldwide standard for wired digital telephony. Since ISDN was developed in 1984 as a public network it does not support modern sophisticated fraud detection systems. Indeed most current installations of ISDN are incapable of supporting encrypted transmission. Securing user information is therefore normally done outside the ISDN communica...

متن کامل

Enhancing Security and Robustness in ISDN Networks

In the current time, Computer Networks are influencing the lives of Human Beings to a great extent, the evolution of public Integrated Services Digital Network (ISDN) with complete end to end digital connectivity provides a magnificent platform for networking and reliable data communications. The main objective behind this Research paper is to develop and implement methodologies in a new frame-...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998