Remember
Register
1
new
Chill
new
Puzzles
new
GK
new
Sports
new
Business
Home
Questions
MCQs
Unanswered
Tags
Users
Ask a Question
Write Article
Articles
Connect to us
Post under tag security
Recent questions under tag security
Recent
MCQs
Unanswered
Most votes
Most views
Most answers
All
Jobs
Articles
+1
vote
0
answers
5G: What is IPsec ESP and IKEv2 certificate based authentication and how it is being used for the 5G network ?
posted
Feb 17, 2018
by
Harshita
5g
lte
security
core network
ran
+1
vote
0
answers
5G: What is multiple active NAS connection concept in 5G network and when an UE would have such multiple connection ?
posted
Feb 17, 2018
by
Harshita
5g
lte
security
nas
core network
+1
vote
1
answer
5G: What's role SIDF play in the 5G network ?
posted
Feb 17, 2018
by
Harshita
5g
lte
security
core network
+1
vote
0
answers
5G: In which scenarios, Integrity protection would be enabled between UE and gNB for the user data ?
posted
Feb 16, 2018
by
Harshita
5g
lte
security
ue
gnb
0
votes
0
answers
5G: How does 5G Authentication and Key Agreement (5G-AKA) work ?
posted
Feb 13, 2018
by
Harshita
5g
security
ue
nas
rrc
+1
vote
0
answers
In general when an integrity protection is becomes mandatory and when encryption becomes mandatory ?
posted
Oct 12, 2017
by
anonymous
encryption
security
interview questions
+2
votes
0
answers
In LTE, why the integrity and encryption protection order is different in NAS and AS layer?
posted
Oct 12, 2017
by
anonymous
lte
security
encryption
0
votes
1
answer
What is Spring Security?
posted
Sep 21, 2017
by
anonymous
java
spring
security
interview questions
+2
votes
1
answer
what is the difference between Cyber security and Network security?
posted
Mar 3, 2017
by
Bheemalinga Reddy B
network security
security
+3
votes
1
answer
About UE support UMTS
posted
Jan 20, 2017
by
Jim Tan
lte
ue
umts
security
+1
vote
0
answers
LTE: How the different set of keys are generated to receive the security protected MBMS services ?
posted
Oct 24, 2016
by
Rupam
lte
mbms
security
bmsc
+1
vote
2
answers
LTE: How data of MBMS services are protected ?
posted
Oct 22, 2016
by
Rupam
lte
mbms
security
+1
vote
1
answer
LTE: What is the security gateway and where it is used in the LTE network ?
posted
Sep 30, 2016
by
Rupam
lte
security
network security
0
votes
0
answers
What is a DoS attack and how can it be prevented?
posted
Jun 27, 2016
by
anonymous
security
+2
votes
1
answer
LTE : What is the difference between "partial native" and "full native " NAS security context ?
posted
Feb 21, 2016
by
Harshita
lte
security
+1
vote
0
answers
LTE : I came to know that integrity and ciphering order for RRC and NAS level are reverse to each other ?
posted
Feb 21, 2016
by
Harshita
lte
security
+2
votes
1
answer
LTE: What is the difference between Algo ID and Algo distinguisher while generating security keys ?
posted
Feb 19, 2016
by
Harshita
lte
security
nas
+3
votes
1
answer
LTE: How does LTE security key derivation way differ for the S1 and X2 handover ?
posted
Dec 27, 2015
by
Harshita
lte
handover
security
+1
vote
0
answers
LTE : What does NAS Key Set Identifier convey ?
posted
Dec 24, 2015
by
Ganesh Kumar
lte
ue
nas
security
+4
votes
1
answer
LTE: How does authentication procedure work for the LTE network and why it is required ?
posted
Dec 22, 2015
by
Vikram Singh
lte
ue
nas
security
authentication
+3
votes
0
answers
LTE: Does the serving PLMN play any role while deriving authentication and security keys ?
posted
Dec 16, 2015
by
Harshita
lte
security
+1
vote
4
answers
Why we need Two types of Security modes (NAS,AS) in LTE
posted
Oct 9, 2015
by
Mallikharjuna Reddy
lte
security
nas
rrc
ue
+3
votes
0
answers
Why there is 2 level of security as NAS and AS in LTE?
posted
Feb 6, 2015
by
Rajib Samui
lte
security
rrc
nas
+2
votes
0
answers
Why there is separate NAS Security procedure in LTE while it is not in UMTS?
posted
Jan 7, 2015
by
anonymous
security
lte
+3
votes
1
answer
Why security Mode Complete message is integrity protected but unciphered in RRC ?
posted
Dec 15, 2014
by
Gnanendra Reddy
lte
rrc
enodeb
security
+2
votes
1
answer
Can anybody give example of Security Mode Command NAS LTE protocol for null integrity algo?
posted
Dec 4, 2014
by
Aleks Asvaldov
lte
security
+3
votes
1
answer
What is kerberos protocol?
posted
Nov 27, 2014
by
Vrije Mani Upadhyay
networking
security
+2
votes
1
answer
What is PIX firewall security? How does it differ from a firewall?
posted
Nov 13, 2014
by
Vrije Mani Upadhyay
networking
firewall
security
+5
votes
1
answer
Security issues about retransmitted packets in LTE
posted
Oct 25, 2014
by
Shashikant Chaudhari
lte
security
+3
votes
2
answers
How LTE security is implemented and which are the nodes got involved in it?
posted
Oct 20, 2014
by
Vikram Luthra
lte
security
+4
votes
1
answer
Why Network Time Synchronization is important?
posted
Oct 7, 2014
by
Vrije Mani Upadhyay
networking
security
+2
votes
1
answer
what is Certificate issued by Certificate Authority (CA)?
posted
Sep 30, 2014
by
Bheemappa G
security
ipsec
son
+1
vote
1
answer
Use of Integrity protection in LTE?
posted
Jul 7, 2014
by
Yogeshwar Thakur
lte
integrity
security
0
votes
1
answer
LTE: What does AMF signify ?
posted
Jun 24, 2014
by
Neelam
lte
mme
security
0
votes
1
answer
LTE: What are all KDF used in LTE ?
posted
Jun 19, 2014
by
Harshita
lte
enodeb
mme
security
+1
vote
2
answers
Why do we have these EPS security context: Native and mapped contexts?
posted
May 20, 2014
by
Kapil Kapoor
eps
lte
security
+5
votes
1
answer
How H(e)NB are authenticated in LTE/SAE?
posted
Apr 12, 2014
by
Hafeth Dawbaa
lte
aka
security
authentication
henb
+4
votes
1
answer
LTE : NAS security mode command , how to form a final message M that is given as input to AES_CMAC function.?
posted
Apr 9, 2014
by
Bheemappa G
lte
security
+9
votes
1
answer
Access Stratum Security Activation Procedure?
posted
Apr 2, 2014
by
Hiteshwar Thakur
lte
enodeb
security
ue
+3
votes
3
answers
EPS authentication, please explain?
posted
Apr 1, 2014
by
Hafeth Dawbaa
eps
authentication
lte
security
aka
+8
votes
1
answer
LTE: Difference between "SNOW 3G" and "AES" algorithms ?
posted
Feb 1, 2014
by
Vikram Singh
lte
security
mme
+2
votes
1
answer
LTE: How does integrity verification is performed by receiving PDCP entity ?
posted
Dec 18, 2013
by
Harshita
pdcp
ue
enodeb
lte
security
+2
votes
0
answers
LTE: How Kenb* being generated ?
posted
Dec 12, 2013
by
Harshita
lte
enodeb
ue
security
+1
vote
1
answer
Apache: How to check what ciphers are available to the https compiled binary?
posted
Dec 4, 2013
by
Dewang Chaudhary
apache
ssl
https
security
+2
votes
0
answers
Is LTE more secure as compare to UMTS or HSPA?
posted
Nov 28, 2013
by
Salil Agrawal
lte
security
+5
votes
2
answers
LTE: Can anyone please explain that how COUNT value is used to cipher a PDCP SDU ?
posted
Nov 21, 2013
by
Vikram Singh
lte
ue
enodeb
pdcp
security
+4
votes
0
answers
Has any one worked with activation of hardware security (IP Sec, SNOW 3G Algos) In freescale board
posted
Nov 8, 2013
by
Sachidananda Sahu
lte
security
powerpc
enodeb
+4
votes
1
answer
How hardware accelerators is better than software solution support integrity and encryption in lte ?
posted
Sep 29, 2013
by
Vikram Singh
lte
enodeb
security
+4
votes
1
answer
why implementation of EIA0 in MME is optional ?
posted
Sep 26, 2013
by
Neeraj Mishra
mme
security
lte
+1
vote
0
answers
Virus security in Android
posted
Sep 16, 2013
by
Amit Parthsarthi
android
security
Page:
1
2
next »
...