Welcome![Sign In][Sign Up]
Location:
Search - encryption gsm

Search list

[VOIP programspeakfs-7.6a

Description: ip电话软件speakfs 7.6a版本,GSM, ADPCM, LPC, and LPC-10压缩和多种加密算法 -speakfs ip phone software version 7.6a, GSM, ADPCM, LPC, and LPC-10 compression and multiple encryption algorithm
Platform: | Size: 1570219 | Author: 文心 | Hits:

[Other resourcechannelencoding

Description: 完整的GSM信道编码 为话音信道的卷积编译码 还有交织-integrity of the GSM channel coding for voice channel convolution encryption also intertwined
Platform: | Size: 34702 | Author: gs | Hits:

[Communication-MobileGSM-CHANNEL-CODING

Description: MATLBA 信道仿真,完成信道卷积码循环码的编译码-MATLBA channel simulation complete Channel Convolutional Codes cycle code encryption
Platform: | Size: 797260 | Author: 李丽 | Hits:

[Crack Hacka5

Description: 用于GSM加密的A5算法实现- Uses in GSM the encryption A5 algorithm to realize
Platform: | Size: 6144 | Author: 站长 | Hits:

[VOIP programspeakfs72

Description: ip电话软件speakfs 7.2版本,GSM, ADPCM, LPC, and LPC-10压缩和多种加密算法-ip phone software speakfs 7.2 version, GSM, ADPCM, LPC, and LPC-10 compression and a variety of encryption algorithm
Platform: | Size: 1116160 | Author: | Hits:

[VOIP programspeakfs-7.6a

Description: ip电话软件speakfs 7.6a版本,GSM, ADPCM, LPC, and LPC-10压缩和多种加密算法 -speakfs ip phone software version 7.6a, GSM, ADPCM, LPC, and LPC-10 compression and multiple encryption algorithm
Platform: | Size: 1569792 | Author: 文心 | Hits:

[MiddleWarechannelencoding

Description: 完整的GSM信道编码 为话音信道的卷积编译码 还有交织-integrity of the GSM channel coding for voice channel convolution encryption also intertwined
Platform: | Size: 34816 | Author: gs | Hits:

[Communication-MobileGSM-CHANNEL-CODING

Description: MATLBA 信道仿真,完成信道卷积码循环码的编译码-MATLBA channel simulation complete Channel Convolutional Codes cycle code encryption
Platform: | Size: 796672 | Author: 李丽 | Hits:

[Windows MobileCryptoPhone-src-031122

Description: 手机加密通话软件,通过GSM网络的CSD信道传输数据,与VOIP不同,无须后台就可以实现点对点呼叫-Phone call encryption software, the CSD through the GSM network to transmit data channel, with different VOIP without the background can be achieved point-to-point call
Platform: | Size: 1908736 | Author: lucifer | Hits:

[Othergsmyuyin

Description: gsm系统中话音加密技术的研究,gsm系统中话音加密技术的研究-gsm voice encryption systems research, gsm voice encryption systems research
Platform: | Size: 79872 | Author: 骆伯萍 | Hits:

[Software EngineeringGSM

Description: GSM加密手机系统的安全性设计研究,研究gsm的好资料。-GSM phone encryption system security design studies gsm good information.
Platform: | Size: 791552 | Author: dly252 | Hits:

[VOIP programSimRTP

Description: 可以將聲音由麥克風取得壓縮後用RTP送出。可以使用PCM GSM。使用簡單方便,也可以在裡面加上加密解密。-Voice can be compressed by a microphone made out with RTP. Can use the PCM GSM. The use of simple and convenient, can also be combined with encryption and decryption on the inside.
Platform: | Size: 1189888 | Author: dearw | Hits:

[Communication-MobilecrackingA5

Description: Cracking GSM A5 encryption
Platform: | Size: 844800 | Author: greg | Hits:

[File FormatcrackingGSMA5document

Description: cracking gsm A5 encryption
Platform: | Size: 844800 | Author: greg | Hits:

[File FormatGSMA5document

Description: gsm A5 encryption cracking
Platform: | Size: 844800 | Author: greg | Hits:

[Crack Hack15883865channelencoding

Description: integrity of the GSM channel coding for voice channel convolution encryption also intertwined
Platform: | Size: 34816 | Author: cyberra2n | Hits:

[VOIP programespeak-1.44.05-win

Description: 一种通话加密的方式源码,手机加密通话软件,通过GSM网络的CSD信道传输数据,与 VOIP不同,无须后台就可以实现点对点呼叫。-The way a call encryption source code, phone call encryption software, through GSM CSD network channel transmission of data, and VOIP is different from point to point can be achieved without a call back.
Platform: | Size: 1639424 | Author: 冯进伟 | Hits:

[OtherGSM-A3A8

Description: GSM移动通信系统中的A3A8加密算法代码实现-A3A8 encryption algorithm code to achieve in the GSM mobile communication system
Platform: | Size: 2048 | Author: linyang | Hits:

[Crack HackGSM-algorithm-A5

Description: GSM加密标准A5算法C语言实现,程序仅供参考-GSM encryption algorithm A5 standard C language, the program is only for reference
Platform: | Size: 1024 | Author: WANG | Hits:

[Program docInterception of GSM

Description: a paper about GSM. The cell tower and phone negotiate the highest level of crypto that both mutually support. During call setup a handset sends a packet that states its crypto level and the tower will return a signal with what is actually going to be used. Devices that intercept GSM clear-data simulate a tower and proxy the data to the real tower. They drop the 'I support crypto' packet from the handset so the tower thinks that the handset does not support any type of encryption and transmits the call in the clear.
Platform: | Size: 16384 | Author: aliaskari | Hits:
« 12 »

CodeBus www.codebus.net