TITLE

Outsmarted By A Virus

AUTHOR(S)
Wickham, Rhonda
PUB. DATE
August 2004
SOURCE
Wireless Week;8/15/2004, Vol. 10 Issue 17, p4
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Presents an article about the impact of computer viruses on consumers and the wireless industry. Contribution of protective software to the detection of viruses; Percentage of mobile computing devices which are not protected against viruses; Responsibility of wireless carriers toward their consumers with regard to computer virus tracking prevention.
ACCESSION #
14185318

 

Related Articles

  • A Study on Efficient Authentication Protocol with User Anonymity for Wireless Networks. Padmanabhuni, Nikita; Prasanna, Mylavarapu.; Himaja, Vangala // International Journal of Computer Science Engineering & Technolo;Sep2013, Vol. 3 Issue 9, p329 

    In this paper, a new anonymous authentication protocol based on anonymous proxy signature for wireless Communications is proposed. The protocol involves only two parties including mobile user and visited server, without the participation of home server. Then the security and performance of the...

  • Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Jun-Sub Kim; Jin Kwak // International Journal of Security & Its Applications;2012, Vol. 6 Issue 3, p45 

    The user authentication scheme in a global mobility network is an important security issue that allows users of mobile devices to access a secure roaming service through wireless networks. Over recent years, many anonymous authentication schemes have been proposed for roaming services in global...

  • Substitutive Mutual Authentication between Mobile Base Stations in Tactical Networks. Yu-Jin Son; Taeshik Shon; Young-Bae Ko // International Journal of Security & Its Applications;May2013, Vol. 7 Issue 3, p45 

    This paper proposes a cooperated mutual authentication scheme for mobile base stations (MBS) that construct a Wireless Mesh Network (WMN) in the Tactical Information Communication Networks (TICN). To enhance the fighting capabilities and survivability of soldiers in battlefields, it is crucial...

  • Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network. Xie, Qi; Hu, Bin; Tan, Xiao; Bao, Mengjie; Yu, Xiuyuan // Wireless Personal Communications;Jan2014, Vol. 74 Issue 2, p601 

    Two-factor authentication scheme for roaming service in global mobility network enables the mobile user in possession of a password and a smart card to achieve mutual authentication and session key establishment with the foreign agent. In this paper, we first identify six properties of this type...

  • Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks. Gope, Prosanta; Hwang, Tzonelih // Wireless Personal Communications;Jun2015, Vol. 82 Issue 4, p2231 

    Rapid development of wireless networks brings about many security problems in mobile communications. In this regard, designing a secure user authentication scheme, especially for recognizing legal roaming users is indeed a challenging task. Recently, Wen et al. proposed such scheme, which is...

  • BY THE NUMBERS.  // Wireless Review;Jul2005, Vol. 22 Issue 7, p13 

    Provides information on a survey in the field of wireless communication and telecommunication in the U.S. as of July 2005. Monthly charge from Zoie for watching movies on handsets; Percentage of all enterprise mobile devices that will be infected with viruses by the end of 2007; Number of...

  • Efficient Mobile Authentication Scheme Preserving User Privacy for Large-Scale Wireless Networks. WEI, LI; YAO, YONGTAO; DING, ZHIJUN; PU, QIONG // Adhoc & Sensor Wireless Networks;2013, Vol. 17 Issue 3/4, p313 

    Most recently, Chang and Tsai proposed an anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks. In this paper, we point out their scheme cannot provide user unlinkability, which is important to protect user privacy. Moreover, we...

  • An Anti-Shoulder Surfing Mechanism and its Memorability Test. Seng, Lim Kah; Ithnin, Norafida; Mammi, Hazinah Kutty // International Journal of Security & Its Applications;Oct2012, Vol. 6 Issue 4, p87 

    To improve security of mobile device graphical password towards shoulder surfing attack, an anti-shoulder surfing mechanism called Painting Album Mechanism is proposed. This mechanism is constructed based on concept of painting album, and it is consists of three input schemes called Swipe...

  • The Need for Integration in NFC Mobile Payments. Pourghomi, Pardis; Saeed, Muhammad Qasim; Ghinea, Gheorghita // Journal of Information Assurance & Security;2014, Vol. 9 Issue 2, p51 

    Near Field Communication (NFC) is a short range wireless technology that provides contactless transmission of data between devices. With an NFC-enabled device, users can exchange information from one device to another and make payments using their NFC devices as means of their identity. Since...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics