Skip to main navigation
Skip to search
Skip to main content
University of Birmingham Home
Help & FAQ
Home
Research output
Profiles
Research units
Projects
Activities
Datasets
Equipment
Prizes
Press/Media
Search by expertise, name or affiliation
DECT security analysis
Erik Tews
Computer Science
Research output
:
Thesis
›
Doctoral Thesis
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'DECT security analysis'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Authentication Algorithm
100%
Brute Force
33%
Cipher
66%
Cipher Algorithms
33%
Cordless Phone
33%
Decrypt
33%
Encryption
33%
Initial Attack
33%
Key Derivation
33%
Over the Air
33%
Radio Protocol
33%
Secret Key
33%
Security Analysis
100%
Voice Call
33%
Computer Science
Authentication
100%
Cordless Phone
25%
Device Manufacturer
25%
Disclosure Agreement
25%
Fast Algorithm
25%
Security Analysis
100%
Engineering
Device Manufacturer
100%
Fast Algorithm
100%
Secret Key
100%