A3 |
Authentication Algorithm |
A5 |
Ciphering Algorithm |
A8 |
Ciphering Key Generating Algorithm |
ADMF |
Administrative Function |
AoC |
Advice of Charge |
AUC |
Authentication Center |
AKA |
Authentication and Key Agreement |
AN |
Access Network |
BSC |
Base Station Controller |
BSS |
Base Station System |
BSSAP |
Base Station Subsystem Application Part |
BTS |
Base Tranceiver Station |
CAMEL |
Customized Application for Mobile Enhanced Logic |
CBC |
Cipher Block Chaining |
CC |
Content of Communication |
CCBS |
Customer Care and Billing System |
CDMA |
CDMA Division Multiple Access |
CDR |
Call Data Record |
CEIR |
Central Equipment Identity Register |
CEPT |
European Conference of Post and Telecommunication Administrations |
CFB |
Cipher Feedback |
CGI |
Cell Global Identity |
CKSN |
Cipher Key Sequence Number |
CMEA |
Cellular Message Encryption Algorithm |
CUG |
Closed User Group |
DIMSI |
Dual International Mobile Subscriber Identity |
DES |
Data Encryption Standard |
DSA |
Digital Signature Algorithm |
ECB |
Electronic Code Book |
EIR |
Equipment Identity Register |
EDGE |
Enhanced Data GSM Environment |
EIR |
Equipment Identity Register |
EMS |
Enhanced Messaging Service |
ETSI |
European Telecommunications Standards Institute |
GERAN |
GSM EDGE Radio Access Network |
GIWU |
GSM Interworking Unit |
GMSC |
Gateway Mobile Services Switching Center |
GMSK |
Gaussian Minimum Shift Keying |
GPRS |
General Packet Radio System |
GSM |
Global System for Mobile communication |
GTT |
Global Title Translation |
HCSD |
High-Speed Circuit-Switched Data |
HE |
Home Environment |
HLR |
Home Location Register |
IMEI |
International Mobile Equipment Identifier |
IMSI |
International Mobile Subscriber Identity |
IN |
Intelligent Network |
INAP |
Intelligent Network Application Part |
IRI |
Intercept Related Information |
ISAAC |
Internet Security, Applications, Authentication and Cryptography group at the University of California, Berkeley |
Kc |
Ciphering Key |
Ki |
Individual Subscriber Authentication Key |
LA |
Location Area |
LAI |
Location Area Identity |
LEA |
Law Enforcement Agency |
LFSR |
Linear Feedback Shift Register |
LI |
Lawful Interception |
LPC |
Linear Predictive Coding |
MAP |
Mobile Application Part |
MML |
Man-Machine Language |
MMS |
Mobile Multimedia Services |
MNC |
Mobile Network Code |
MoU |
Memorandum of Understanding |
MSC |
Mobile Services Switching Center |
MS |
Mobile Station |
MSE |
Mobile Station Equipment |
MSIN |
Mobile Subscriber Identity Number |
MSISDN |
Mobile Subscriber ISDN |
MSN |
Mobile Service Node |
MSRN |
Mobile Station Roaming Number |
MTP |
Message Transfer Part |
MXE |
Message Center |
MExE |
Mobile Execution Environment |
NIST |
National Institute of Standards and Technology |
NSS |
Network and Switching Subsystem |
OMC |
Operations and Maintenance Center |
OSS |
Operation and Support System |
OTA |
Over The Air |
PCS |
Personal Communications Service |
PDP |
Packet Data Protocol |
PKCS |
Public Key Cryptography System |
PLMN |
Public Land Mobile Network |
PSTN |
Public Switched Telephone Network |
RFM |
Remote Files Management |
RSA |
Rivest, Shamir, Adleman |
SAGE |
Security Algorithms Group of Experts |
SAS |
Security Accreditation Scheme |
SCI |
Subscriber Controlled Input |
SHA |
Secure Hash Algorithm |
SIM |
Subscriber Identification Module |
SMS |
Short Message Service |
SMSC |
Short Message Service Center |
SN |
Serving Network |
SO |
Service Order |
SRES |
Signed Response |
SS |
Switching System |
SS7 |
Signaling System 7 |
TCAP |
Transaction Capabilities Application Part |
TDMA |
Time Division Multiple Access |
TMSI |
Temporary Mobile Subscriber Identity |
UMTS |
Universal Mobile Telecommunications Service |
USIM |
User Services Identity Module |
VLR |
Visitor Location Register |
VMS |
Voice Mail Service / Voice Messaging Service |
WAP |
Wireless Application Protocol |