Essays about: "3G SECURITY"

Showing result 11 - 15 of 16 essays containing the words 3G SECURITY.

  1. 11. Secure Session Mobility for VoIP

    University essay from KTH/Kommunikationssystem, CoS

    Author : Samir Dzaferagic; [2008]
    Keywords : Secure VoIP; SIP; Mobile IP; Session Mobility;

    Abstract : High data rate wireless packet data networks have made real-time IP based services available through mobile devices. At the same time, differences in the characteristics of radio technologies (802.11/WiFi and 3G networks) make seamless handoff across heterogeneous wireless networks difficult. READ MORE

  2. 12. IPsec Intrusion Detection Analysis : Using data from an Ericsson Ethernet Interface Board

    University essay from KTH/Kommunikationssystem, CoS

    Author : Julian Amso; Achille Faienza; [2008]
    Keywords : IPsec; IDS; Intrusion; Attack; Detection; VPN; 3G; ET-MFX; Security;

    Abstract : IP security (IPsec) is commonly used for protection in Virtual Private Networks (VPN). It is also used for the protection of traffic between nodes in third generation (3G) mobile networks. The main duty of telecommunication operators is to assure the quality of service and availability of the network for their users. READ MORE

  3. 13. IMS Interworking

    University essay from KTH/Kommunikationssystem, CoS

    Author : Boris Iv. Kalaglarski; Emilio Di Geronimo; [2007]
    Keywords : IMS; Interworking; 3G; DNS; Security; IPv6;

    Abstract : The goal of this project was to analyze the IP Multimedia Subsystem (IMS) with respect to the interworking functionality between two or more IMS domains belonging to different operators. The thesis presents an overview of IMS, its purpose, the circumstances and the environment in which it has evolved, and a look into some of the challenges that lie ahead. READ MORE

  4. 14. Security in Unlicensed Mobile Access

    University essay from Institutionen för systemteknik

    Author : Martin Eriksson; [2005]
    Keywords : Unlicensed Mobile Access; UMA; GSM; GRPS; UMTS; security; flaws;

    Abstract : Unlicensed Mobile Access (UMA) provides transparent access to 2G and 3G networks for Mobile Stations over the unlicensed radio interface. Unlicensed radio tehnologies such as Bluetooth or WLAN technology connects the Mobile Station to the fixed IP network of the home or office and delivers high bandwith to the Mobile Station. READ MORE

  5. 15. DRM : Digital Rights Management

    University essay from Blekinge Tekniska Högskola/Avdelningen för för interaktion och systemdesign

    Author : Johan Bengtsson; Emma Hansson; [2001]
    Keywords : Digital Rights Management;

    Abstract : In recent years, technological developments have led to digital files being more easily distributed, for example through Napster (a file sharing service on the Internet). In order to manage and control the distribution of digital files, a new concept has been developed, called DRM (Digital Rights Management). READ MORE