This page displays all 「FI」 in main group H04W12/00. |
HB:Handbook | ||||
CC:Concordance |
|
Security arrangements; Authentication; Protecting privacy or anonymity [2021.01] | HB | CC | 5K067 | |
|
.Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII] [2009.01] | HB | CC | 5K067 | |
|
.Protecting confidentiality, e.g. by encryption [2021.01] | HB | CC | 5K067 | |
|
..of the user plane, e.g. user's traffic [2021.01] | HB | CC | 5K067 | |
|
..of the control plane, e.g. signalling traffic [2021.01] | HB | CC | 5K067 | |
|
.Key management, e.g. using generic bootstrapping architecture [GBA] [2021.01] | HB | CC | 5K067 | |
|
..Key generation or derivation [2021.01] | HB | CC | 5K067 | |
|
..using a trusted network node as an anchor [2021.01] | HB | CC | 5K067 | |
|
...Key distribution or pre-distribution; Key agreement [2021.01] | HB | CC | 5K067 | |
|
...Key management protocols [2021.01] | HB | CC | 5K067 | |
|
..without using a trusted network node as an anchor [2021.01] | HB | CC | 5K067 | |
|
...Key exchange [2021.01] | HB | CC | 5K067 | |
|
.Authentication [2021.01] | HB | CC | 5K067 | |
|
..Pre-authentication [2021.01] | HB | CC | 5K067 | |
|
..Continuous authentication [2021.01] | HB | CC | 5K067 | |
|
..using certificates or pre-shared keys [2021.01] | HB | CC | 5K067 | |
|
.Access security [2021.01] | HB | CC | 5K067 | |
|
..using revocation of authorisation [2021.01] | HB | CC | 5K067 | |
|
..using delegated authorisation, e.g. open authorisation [OAuth] protocol [2021.01] | HB | CC | 5K067 | |
|
..using security domains [2021.01] | HB | CC | 5K067 | |
|
..using filters or firewalls [2021.01] | HB | CC | 5K067 | |
|
.Integrity [2021.01] | HB | CC | 5K067 | |
|
..Route integrity, e.g. using trusted paths [2021.01] | HB | CC | 5K067 | |
|
..Location integrity, e.g. secure geotagging [2021.01] | HB | CC | 5K067 | |
|
..Packet or message integrity [2021.01] | HB | CC | 5K067 | |
|
..Source integrity [2021.01] | HB | CC | 5K067 | |
|
.Detection or prevention of fraud [2021.01] | HB | CC | 5K067 | |
|
..Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS] [2021.01] | HB | CC | 5K067 | |
|
...Counter-measures against attacks; Protection against rogue devices [2021.01] | HB | CC | 5K067 | |
|
..Protection against power exhaustion attacks [2021.01] | HB | CC | 5K067 | |
|
..Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning [2021.01] | HB | CC | 5K067 | |
|
..Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware [2021.01] | HB | CC | 5K067 | |
|
.Security of mobile devices; Security of mobile applications [2021.01] | HB | CC | 5K067 | |
|
..using wearable devices, e.g. using a smartwatch or smart-glasses [2021.01] | HB | CC | 5K067 | |
|
..Managing security policies for mobile devices or for controlling mobile applications [2021.01] | HB | CC | 5K067 | |
|
.Security arrangements using identity modules [2021.01] | HB | CC | 5K067 | |
|
..using virtual identity modules [2021.01] | HB | CC | 5K067 | |
|
..using shared identity modules, e.g. SIM sharing [2021.01] | HB | CC | 5K067 | |
|
..using multiple identity modules [2021.01] | HB | CC | 5K067 | |
|
..using near field communication [NFC] or radio frequency identification [RFID] modules [2021.01] | HB | CC | 5K067 | |
|
..using secure binding, e.g. securely binding identity modules to devices, services or applications [2021.01] | HB | CC | 5K067 | |
|
.Secure pairing of devices [2021.01] | HB | CC | 5K067 | |
|
..involving three or more devices, e.g. group pairing [2021.01] | HB | CC | 5K067 | |
|
.Context-dependent security [2021.01] | HB | CC | 5K067 | |
|
..Time-dependent [2021.01] | HB | CC | 5K067 | |
|
..Location-dependent; Proximity-dependent [2021.01] | HB | CC | 5K067 | |
|
...using geofenced areas [2021.01] | HB | CC | 5K067 | |
|
..Environment-dependent, e.g. using captured environmental data [2021.01] | HB | CC | 5K067 | |
|
..Risk-dependent, e.g. selecting a security level depending on risk profiles [2021.01] | HB | CC | 5K067 | |
|
..Gesture-dependent or behaviour-dependent [2021.01] | HB | CC | 5K067 | |
|
..Identity-dependent [2021.01] | HB | CC | 5K067 | |
|
...Hardware identity [2021.01] | HB | CC | 5K067 | |
|
...Subscriber identity [2021.01] | HB | CC | 5K067 | |
|
...Access point logical identity [2021.01] | HB | CC | 5K067 | |
|
...Temporary identity [2021.01] | HB | CC | 5K067 | |
|
...Group identity [2021.01] | HB | CC | 5K067 | |
|
...Graphical identity [2021.01] | HB | CC | 5K067 | |
|
...Radio fingerprint [2021.01] | HB | CC | 5K067 | |
|
.Arrangements enabling lawful interception [LI] [2021.01] | HB | CC | 5K067 | |