Reports & Deliverables

  • Deliverable D1, expected T0+12: A preliminary design of the authenticated key-exchange protocol for 5G networks.
  • Deliverable D2, expected T0+24: Lawful-interception-compliant end-to-end encryption between Alice and Bob.
  • Deliverable D3, expected T0+36: Privacy-preserving data-handling in 5G networks.
  • Deliverable D4, expected T0+36: Establishing trust in the 5G core network using remote secure attestation and trusted anchors.
  • Deliverable D5, expected T0+48: Attacks by screaming channels in 5G networks.
  • Deliverable D6 expected T0+48: Designing secure applications in a 5G scenario.

© 2019 Cristina Onete
Last modified on 12/02/2019