ATIS Telecom Glossary
Wednesday, July 23, 2014

A B C D E F G H I
J K L M N O P Q R
S T U V W X Y Z  
Go
 
Glossary Home
Foreword
Introduction
Normative References
Using the ATIS Telecom Glossary
Annex A: Informative References
 
 
 
<< Back
cover
The technique of concealing or altering the characteristics of communications patterns for the purpose of denying an unauthorized receiver information that would be of value; a process of modulo two addition of a pseudorandom bit stream generated by a cryptographic device with bits from the control message.

 

 

 

 

 

 

 

 

 

 



 
These definitions were prepared by ATIS Committee PRQC
 
For more information on the work related to these definitions,
please visit the ATIS website and the ATIS Document Center