TITLE

Proof Beyond The Password

AUTHOR(S)
Smith, Brad
PUB. DATE
April 2004
SOURCE
Wireless Week;4/1/2004, Vol. 10 Issue 8, p10
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Provides information on several enhancements made to authentication methods and security measures used in the wireless communications industry in the U.S. Digital signatures; Biometrics; Subscriber identity module card; Speech voice recognition.
ACCESSION #
12793574

 

Related Articles

  • A Survey of Vein Recognition Techniques. Hao Luo; Fa-Xin Yu; Jeng-Shyang Pan; Shu-Chuan Chu; Pei-Wei Tsai // Information Technology Journal;2010, Vol. 9 Issue 6, p1142 

    No abstract available.

  • Efficient and Robust Multimodal Biometric System for Feature Level Fusion (Speech and Signature). Kaur, Dapinder; Kaur, Gaganpreet; Singh, Dheerendra // International Journal of Computer Applications;Aug2013, Vol. 75 Issue 1-17, p33 

    A Pattern can be characterized by more or less rich & varied pieces of information of different features. The fusion of these different sources of information can provide an opportunity to develop more efficient biometric system which is known as Multimodal biometric System. Multimodal...

  • Mobile Digital Signatures. Golden, Paul // Global Telephony;May2001, Vol. 9 Issue 5, p8 

    Reports on Great Britain-based Vodafone's trial of a wireless communication system that incorporates the use of digital signatures. Response to users' reservations concerning transactions performed over a wireless interface; Use of private key infrastructure; Requirement of handsets that...

  • Biometrics: Boon or Bust? Kerstetter, Jim; Spooner, John G. // PC Week;11/16/98, Vol. 15 Issue 46, p6 

    Focuses on biometric security products for computers. The slow acceptance of biometrics as of November 1998; Development by Veridicom Inc. of a fingerprint recognition module which connects via USB, PCMCIA or a parallel port; Keyboards from WhoVision Systems Inc. with fingerprint sensor...

  • Biometrics 101. Filippini, Steve // Sound & Video Contractor;Oct2005, Vol. 23 Issue 10, p36 

    Presents information on technological developments in the field of biometrics. Factors to consider in using fingerprint scanning as a method of biometric verification; Effectiveness of facial geometry analysis in the identification of an individual's facial features; Comparison between static...

  • How Secure Is the Wireless Internet? Teerikorpi, Eero // Telecommunications - Americas Edition;May2001, Vol. 35 Issue 5, p46 

    Presents steps for safe wireless access. Authentication of authorized access; Differences between wireless and wired Internet; Use of Secure Socket Layer protocols; Implementation of systems based on wireless application protocol specifications.

  • Mom's Maiden Name. Crowe, David // Wireless Review;06/01/2000, Vol. 17 Issue 11, p60 

    Discusses the methods used in combating technical frauds in wireless systems, validation and authentication. Information on the international mobile-subscriber identity; Details on challenge-response authentication; Information on the concept of shared secret data.

  • A Key Management Scheme for Secure Proxy Mobile IPv6. Hyun-Sun Kang // Journal of Security Engineering;Aug2011, Vol. 8 Issue 4, p433 

    PMIPv6 (Proxy Mobile IPv6) is a promising next-generation mobility protocol. But in terms of speed and security is yet to be supported is that a lot of points. In this paper, point out some problems of previous authentication mechanisms associated with PMIPv6 and propose a new secure...

  • Improved Cross Authentication Model Based on Threshold Method in Wireless Network. Yang, Yatao; Pan, Shaoming // International Journal of Distributed Sensor Networks;Jan/Feb2009, Vol. 5 Issue 1, p86 

    A novel cross authentication model is proposed based on (t, n) threshold method in Layered and Grouped Structure (LGS) wireless multi-hop network, the issues of cross authentication and secure communication between nodes in different trusted domains are settled. With no CA, new scheme of cross...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics