Novel key management for 3G end-to-end encryption

@article{Wang2009NovelKM,
  title={Novel key management for 3G end-to-end encryption},
  author={Jian Wang and Nan Jiang and Hui Li and Xinxin Niu and Yixian Yang},
  journal={2009 Global Mobile Congress},
  year={2009},
  pages={1-7}
}
People increasingly depend on the mobile communication networks, specially the third generation of mobile communication network (3G), to transmit data with one another. Although 3G networks implement data confidentiality and integrity within network components, but don't offer user's end-to-end confidentiality and integrity. End-to-end encryption could improve these vulnerabilities, and facilitates many security applications. The linchpin of end-to-end encryption is how to efficiently manage… CONTINUE READING