ETS 300 841 - Edition 01 - Telecommunications Security; Integrated Services Digital Network (ISDN); Encryption key management and authentication system for audiovisual services
ثبت نشده
چکیده
منابع مشابه
Telecommunications and Network Security
The CIA TRIAD The following is how to preserve the CIA triad in the telecommunications and network security domain: Confidentiality – Network Security Protocols – Network authentication services – Data Encryption Services Integrity-Firewall Services-Communications Security Management-IDS's Availability-Fault tolerance for data availability, such as backups and redundant disk systems-Acceptable ...
متن کاملAuthentication protocols for the broadband ISDN billing system
Ž . The broadband integrated services digital network B-ISDN offers a wide variety of services to its customers. From both provider’s and user’s perspective, a fair and flexible billing system is indispensable to the operation of B-ISDN. In this paper, we discuss different billing policies, and their corresponding authentication protocols, which can be used by the B-ISDN billing system. Flat ra...
متن کاملSecurity Upgrade of Existing ISDN Devices by Using Reconfigurable Logic
Integrated Services Digital Network (ISDN) is a de facto worldwide standard for wired digital telephony. Since ISDN was developed in 1984 as a public network it does not support modern sophisticated fraud detection systems. Indeed most current installations of ISDN are incapable of supporting encrypted transmission. Securing user information is therefore normally done outside the ISDN communica...
متن کاملEnhancing Security and Robustness in ISDN Networks
In the current time, Computer Networks are influencing the lives of Human Beings to a great extent, the evolution of public Integrated Services Digital Network (ISDN) with complete end to end digital connectivity provides a magnificent platform for networking and reliable data communications. The main objective behind this Research paper is to develop and implement methodologies in a new frame-...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کامل