User Traffic Confidentiality
- Ciphering algorithm agreement: the mobile and the station can securely negotiate ciphering algorithm that they use.
- Cipher key agreement: the mobile and the station agree on a cipher key that they may use.
- Confidentiality of user and signalling data: neither user data nor sensitive signalling data can be overheard on the radio access interface.
Read more about this topic: UMTS Security
Famous quotes containing the words user and/or traffic:
“A worker may be the hammers master, but the hammer still prevails. A tool knows exactly how it is meant to be handled, while the user of the tool can only have an approximate idea.”
—Milan Kundera (b. 1929)
“Theres something about the dead silence of an office building at night. Not quite real. The traffic down below is something that didnt have anything to do with me.”
—John Paxton (19111985)
Related Phrases
Related Words