This part of the Digital European Cordless Telecommunications (DECT) Common Interface specifies the security architecture, the types of cryptographic algorithms required, the way in which they are to be used, and the requirements for integrating the security features provided by the architecture into the DECT Common Interface. It also describes how the features can be managed and how they relate to certain DECT fixed systems and local network configurations.
PUBLISHED
SSH ETS 300 175-7:1992 ed.1
60.60
Standard published
4 korr 2024