Authentication: The New Generation

Crowe, David
November 1998
Wireless Review;11/01/98, Vol. 15 Issue 21, p46
Trade Publication
Announces that the Tax Institute of America (TIA) is planning to increase wireless communications security in response to a published criticism. Reason for the unique challenges of developing security algorithms; Basis of encryption algorithms for cellular authentication and voice encryption (CAVE) algorithm; Benefits from improving security on wireless phones.


Related Articles

  • Introduction: Nuclear weapons. Krapf, Eric // America's Network;03/15/96 Supplement, Vol. 100 Issue 6, pS22 

    Focuses on fraud prevention in personal communication services in the United States. Authentication in digital networks as unprecedented protection against cloners; Roamers as the top on the list of vulnerable customers.

  • The low-hanging fruit. Krapf, Eric // America's Network;03/15/96 Supplement, Vol. 100 Issue 6, pS24 

    Looks at the potential for fraud and fraud prevention in personal communication services in the United States. Authentication as a potent tool against fraud; Code division multiple access system; Roaming fraud; Use of personal identification numbers; Radio fingerprinting; Roamer...

  • Security: Everyone Has A Stake. Dziatkiewicz, Mark // Wireless Week;09/18/2000, Vol. 6 Issue 38, p22 

    Discusses issues on the adoption of security measures in the wireless communication industry. Response of several carriers on the issue; Information on global industry initiatives for secure mobile transactions.

  • Security, Privacy Ready For Long Haul. Smith, Brad // Wireless Week;10/28/2002, Vol. 8 Issue 39, p14 

    Focuses on a white paper presented at the Cellular Telecommunication & Internet Association's Wireless Internet Caucus which deals with the issues of privacy and security of wireless subscribers. Step in providing security and privacy for wireless subscribers; Actions being taken by wireless...

  • Protecting Portable Electronic Devices From Attacks.  // Community Banker;May2009, Vol. 18 Issue 5, p13 

    The article presents the recommendations from the U.S. Computer Emergency Readiness Team on how to protect cellular phones and personal digital assistants (PDAs). It states that a person should be careful in posting his or her cell phone numbers and e-mail addresses because attackers often use...

  • Security not just for sidekicks. Clark, Robert // Telecom Asia;Apr2005, Vol. 16 Issue 4, p46 

    In this article the author discusses about the security of vital personal information. The phone numbers of many celebrities like model and socialite Paris Hilton, Pop star Eminem, Tennis player Anna Kournikova and others were posted on a Web site. Hilton's phone was hacked as she was using a...

  • PDAs And Internet Thieves. Pomeroy, Ann // HR Magazine;Sep2005, Vol. 50 Issue 9, p16 

    Reports on the computer security of personal digital assistants (PDA). Benefits from PDA; Ways PDA owners can prevent computer hacking.

  • Enterprise Screams for Network Security. Rockwell, Mark // Wireless Week;11/1/2006, Vol. 12 Issue 22, p37 

    The article discusses the need for network security as mobile devices in the corporate network grows. According to Michael Voellinger of Telwares, mobile devices have become an asset to companies, and it has to be managed. Companies with expanding mobile devices in their information technology...

  • Chips set and MMICs ease short-haul RF-link design. Schweber, Bill // EDN;02/15/96, Vol. 41 Issue 4, p46 

    Presents information on personal communication systems (PCSs). Details on how short-haul RF links operate; Information on the introduction of monolithic microwave ICs (MMICs); Detailed information on the frequency band range. INSETS: Didn't super-regens go out with dinosaurs?.;Table...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics