Skip to main navigation
Skip to search
Skip to main content
University of Birmingham Home
Help & FAQ
Home
Research output
Profiles
Research units
Projects
Activities
Datasets
Equipment
Prizes
Press/Media
Search by expertise, name or affiliation
DECT security analysis
Erik Tews
Computer Science
Research output
:
Thesis
›
Doctoral Thesis
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'DECT security analysis'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Authentication Algorithm
100%
Over the Air
33%
Cipher Algorithms
33%
Voice Call
33%
Cordless Phone
33%
Radio Protocol
33%
Engineering
Device Manufacturer
100%
Secret Key
100%
Computer Science
Disclosure Agreement
25%
Cordless Phone
25%
Device Manufacturer
25%