Related lectures (8)
Mobile Telephony Security
Explores 2G mobile telephony security, covering authentication, encryption, privacy concerns, and vulnerabilities in encryption algorithms.
Mobile Telephony Security
Explores the security challenges and improvements in mobile telephony, covering encryption algorithms, protocols, and integrity/authentication issues.
Message Authentication Codes: Formalism
Explores message authentication codes and their formalism, with a focus on mobile telephony, covering topics like misuse attacks, security notions, and GSM architecture.
Mobile Platform Architecture
Explores mobile software development, app differences, user experience, and push notifications.
Layout of Analog CMOS IC
Covers the layout of analog CMOS ICs, including matching transistors and dealing with parasitics and fabrication asymmetry.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.