Outsmarted By A Virus

Wickham, Rhonda
August 2004
Wireless Week;8/15/2004, Vol. 10 Issue 17, p4
Trade Publication
Presents an article about the impact of computer viruses on consumers and the wireless industry. Contribution of protective software to the detection of viruses; Percentage of mobile computing devices which are not protected against viruses; Responsibility of wireless carriers toward their consumers with regard to computer virus tracking prevention.


Related Articles

  • A Study on Efficient Authentication Protocol with User Anonymity for Wireless Networks. Padmanabhuni, Nikita; Prasanna, Mylavarapu.; Himaja, Vangala // International Journal of Computer Science Engineering & Technolo;Sep2013, Vol. 3 Issue 9, p329 

    In this paper, a new anonymous authentication protocol based on anonymous proxy signature for wireless Communications is proposed. The protocol involves only two parties including mobile user and visited server, without the participation of home server. Then the security and performance of the...

  • Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Jun-Sub Kim; Jin Kwak // International Journal of Security & Its Applications;2012, Vol. 6 Issue 3, p45 

    The user authentication scheme in a global mobility network is an important security issue that allows users of mobile devices to access a secure roaming service through wireless networks. Over recent years, many anonymous authentication schemes have been proposed for roaming services in global...

  • Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks. Gope, Prosanta; Hwang, Tzonelih // Wireless Personal Communications;Jun2015, Vol. 82 Issue 4, p2231 

    Rapid development of wireless networks brings about many security problems in mobile communications. In this regard, designing a secure user authentication scheme, especially for recognizing legal roaming users is indeed a challenging task. Recently, Wen et al. proposed such scheme, which is...

  • Substitutive Mutual Authentication between Mobile Base Stations in Tactical Networks. Yu-Jin Son; Taeshik Shon; Young-Bae Ko // International Journal of Security & Its Applications;May2013, Vol. 7 Issue 3, p45 

    This paper proposes a cooperated mutual authentication scheme for mobile base stations (MBS) that construct a Wireless Mesh Network (WMN) in the Tactical Information Communication Networks (TICN). To enhance the fighting capabilities and survivability of soldiers in battlefields, it is crucial...

  • Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network. Xie, Qi; Hu, Bin; Tan, Xiao; Bao, Mengjie; Yu, Xiuyuan // Wireless Personal Communications;Jan2014, Vol. 74 Issue 2, p601 

    Two-factor authentication scheme for roaming service in global mobility network enables the mobile user in possession of a password and a smart card to achieve mutual authentication and session key establishment with the foreign agent. In this paper, we first identify six properties of this type...

  • BY THE NUMBERS.  // Wireless Review;Jul2005, Vol. 22 Issue 7, p13 

    Provides information on a survey in the field of wireless communication and telecommunication in the U.S. as of July 2005. Monthly charge from Zoie for watching movies on handsets; Percentage of all enterprise mobile devices that will be infected with viruses by the end of 2007; Number of...

  • Efficient Mobile Authentication Scheme Preserving User Privacy for Large-Scale Wireless Networks. WEI, LI; YAO, YONGTAO; DING, ZHIJUN; PU, QIONG // Adhoc & Sensor Wireless Networks;2013, Vol. 17 Issue 3/4, p313 

    Most recently, Chang and Tsai proposed an anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks. In this paper, we point out their scheme cannot provide user unlinkability, which is important to protect user privacy. Moreover, we...

  • Set Up Two-Factor Authentication: What Are You Waiting For? Reach, Catherine Sanders // Law Practice Today;Feb2013, p8 

    The article discusses the use of two-factor authentication in legal practices. It mentions that the concept behind such authentication is that a person cannot access another user's account without knowing the other person's password. According to the author, aside from the password, such service...

  • Top 10 Reasons to Control Employee PDAs. Elfanbaum, Bob; Dinman, Mark // Security: Solutions for Enterprise Security Leaders;Jun2004, Vol. 41 Issue 6, p36 

    Lists concerns that a company should address in getting their handheld security or personal digital assistants (PDA) in order, based on feedback from executives in the U.S. Network passwords; Customer data; Items that should never be stored on a mobile device such as credit card and account...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics