Reports & Deliverables
- Deliverable D1, expected T0+12: A preliminary design of the authenticated key-exchange protocol for 5G networks.
- Deliverable D2, expected T0+24: Lawful-interception-compliant end-to-end encryption between Alice and Bob.
- Deliverable D3, expected T0+36: Privacy-preserving data-handling in 5G networks.
- Deliverable D4, expected T0+36: Establishing trust in the 5G core network using remote secure attestation and trusted anchors.
- Deliverable D5, expected T0+48: Attacks by screaming channels in 5G networks.
- Deliverable D6 expected T0+48: Designing secure applications in a 5G scenario.