Outsmarted By A Virus
Related Articles
- Substitutive Mutual Authentication between Mobile Base Stations in Tactical Networks. Yu-Jin Son; Taeshik Shon; Young-Bae Ko // International Journal of Security & Its Applications;May2013, Vol. 7 Issue 3, p45
This paper proposes a cooperated mutual authentication scheme for mobile base stations (MBS) that construct a Wireless Mesh Network (WMN) in the Tactical Information Communication Networks (TICN). To enhance the fighting capabilities and survivability of soldiers in battlefields, it is crucial...
- Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks. Gope, Prosanta; Hwang, Tzonelih // Wireless Personal Communications;Jun2015, Vol. 82 Issue 4, p2231
Rapid development of wireless networks brings about many security problems in mobile communications. In this regard, designing a secure user authentication scheme, especially for recognizing legal roaming users is indeed a challenging task. Recently, Wen et al. proposed such scheme, which is...
- A Study on Efficient Authentication Protocol with User Anonymity for Wireless Networks. Padmanabhuni, Nikita; Prasanna, Mylavarapu.; Himaja, Vangala // International Journal of Computer Science Engineering & Technolo;Sep2013, Vol. 3 Issue 9, p329
In this paper, a new anonymous authentication protocol based on anonymous proxy signature for wireless Communications is proposed. The protocol involves only two parties including mobile user and visited server, without the participation of home server. Then the security and performance of the...
- Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Jun-Sub Kim; Jin Kwak // International Journal of Security & Its Applications;2012, Vol. 6 Issue 3, p45
The user authentication scheme in a global mobility network is an important security issue that allows users of mobile devices to access a secure roaming service through wireless networks. Over recent years, many anonymous authentication schemes have been proposed for roaming services in global...
- Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network. Xie, Qi; Hu, Bin; Tan, Xiao; Bao, Mengjie; Yu, Xiuyuan // Wireless Personal Communications;Jan2014, Vol. 74 Issue 2, p601
Two-factor authentication scheme for roaming service in global mobility network enables the mobile user in possession of a password and a smart card to achieve mutual authentication and session key establishment with the foreign agent. In this paper, we first identify six properties of this type...
- BY THE NUMBERS. // Wireless Review;Jul2005, Vol. 22 Issue 7, p13
Provides information on a survey in the field of wireless communication and telecommunication in the U.S. as of July 2005. Monthly charge from Zoie for watching movies on handsets; Percentage of all enterprise mobile devices that will be infected with viruses by the end of 2007; Number of...
- Efficient Mobile Authentication Scheme Preserving User Privacy for Large-Scale Wireless Networks. WEI, LI; YAO, YONGTAO; DING, ZHIJUN; PU, QIONG // Adhoc & Sensor Wireless Networks;2013, Vol. 17 Issue 3/4, p313
Most recently, Chang and Tsai proposed an anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks. In this paper, we point out their scheme cannot provide user unlinkability, which is important to protect user privacy. Moreover, we...
- Set Up Two-Factor Authentication: What Are You Waiting For? Reach, Catherine Sanders // Law Practice Today;Feb2013, p8
The article discusses the use of two-factor authentication in legal practices. It mentions that the concept behind such authentication is that a person cannot access another user's account without knowing the other person's password. According to the author, aside from the password, such service...
- Top 10 Reasons to Control Employee PDAs. Elfanbaum, Bob; Dinman, Mark // Security: Solutions for Enterprise Security Leaders;Jun2004, Vol. 41 Issue 6, p36
Lists concerns that a company should address in getting their handheld security or personal digital assistants (PDA) in order, based on feedback from executives in the U.S. Network passwords; Customer data; Items that should never be stored on a mobile device such as credit card and account...