Publication detail

The concept of the complex cryptographic protection for telecommunication networks

Karel Burda

Original Title

The concept of the complex cryptographic protection for telecommunication networks

English Title

The concept of the complex cryptographic protection for telecommunication networks

Type

journal article - other

Language

en

Original Abstract

The cryptographic protection is used to ensure the confidentiality and authenticity of information transmitted between the terminals of information and communication systems. Contemporary development indicates a new trend where the cryptographic protection is used not only between two terminals but also between the terminal and the access point to the network. In this paper, the principle of cryptographic protection in the access network is extended to the entire telecommunication network.

English abstract

The cryptographic protection is used to ensure the confidentiality and authenticity of information transmitted between the terminals of information and communication systems. Contemporary development indicates a new trend where the cryptographic protection is used not only between two terminals but also between the terminal and the access point to the network. In this paper, the principle of cryptographic protection in the access network is extended to the entire telecommunication network.

Keywords

cryptographic protection, telecommunication network

RIV year

2005

Released

30.10.2005

Pages from

231

Pages to

233

Pages count

3

BibTex


@article{BUT45803,
  author="Karel {Burda}",
  title="The concept of the complex cryptographic protection for telecommunication networks",
  annote="The cryptographic protection is used to ensure the confidentiality and authenticity of information transmitted between the terminals of information and communication systems. Contemporary development indicates a new trend where the cryptographic protection is used not only between two terminals but also between the terminal and the access point to the network. In this paper, the principle of cryptographic protection in the access network is extended to the entire telecommunication network.",
  chapter="45803",
  journal="International Journal of Computer Science and Network Security",
  number="10",
  volume="5.",
  year="2005",
  month="october",
  pages="231",
  type="journal article - other"
}