Describe A-Key?
cdmaguru 22-May-2008 05:10:56 AM

Comments


teacherlink.ed.usu.edu/tlresources/units/Pray/Assessment/StashaJameson.pdf -
Posted by crouse


used for security and authentication
Posted by Hash007


In short A-key is used for Authentication and security and stored in AC and is NAM(Numerical Assignment Module) programmed into the MS and also stored in the AC.
Posted by HamidAliKhan


A-key is used for Authentication and security and stored in AC.
Posted by waqqas1


The cryptographic content of various standards is based on secret key technology. The key here is called the A-Key. This key is unique and private. This A-Key is NAM programmed into the MS and also stored in the AC.
Posted by jzhang


This A-Key is NAM(Numerical Assignment Module) programmed into the MS and also stored in the AC(Authentication Center).
Posted by sagitraz



Posted: 22-May-2008 07:29:07 AM By: sagitraz

This A-Key is NAM(Numerical Assignment Module) programmed into the MS and also stored in the AC(Authentication Center).

Posted: 23-May-2008 11:57:01 AM By: jzhang

The cryptographic content of various standards is based on secret key technology. The key here is called the A-Key. This key is unique and private. This A-Key is NAM programmed into the MS and also stored in the AC.

Posted: 30-December-2008 06:54:01 AM By: waqqas1

A-key is used for Authentication and security and stored in AC.

Posted: 30-December-2008 01:43:54 PM By: HamidAliKhan

In short A-key is used for Authentication and security and stored in AC and is NAM(Numerical Assignment Module) programmed into the MS and also stored in the AC.

Posted: 31-December-2008 07:48:03 AM By: Hash007

used for security and authentication

Posted: 06-February-2009 04:35:16 AM By: crouse

teacherlink.ed.usu.edu/tlresources/units/Pray/Assessment/StashaJameson.pdf -