At what price security?

Koren, Rami
April 2005
Portable Design;Apr2005, Vol. 11 Issue 4, p12
Portable devices are being used to store and play high-value content and serving as payment platforms for content on the devices themselves and for other types of micro- and mini-payments. With the increased bandwidth enabled by the 3G network, this trend continues to gain momentum. In this environment, members of the wireless ecosystem including mobile-network operators, handset vendors, contetrf providers, application providers, and SIM card vendors have rich opportunities for increased revenues. But these opportunities are also luring hackers with their own private agendas. To allow safe transactions, both the channels used to download content and portable devices that store this content must be verified as secure. Portable devices also must be authenticacted before private users attempt to make transactions and gain content ownership, corporate users try to access confidential information


Related Articles

  • Data Integrity Protocol for Sensor Networks. Durresi, Arjan; Paruchuri, Vamsi; kannan, Rajgopal; Iyengar, S. S. // International Journal of Distributed Sensor Networks;2005, Vol. 1 Issue 2, p205 

    In this paper, we present a novel lightweight protocol for data integrity in wireless sensor networks. Our protocol is based on a leapfrog strategy in which each cluster head verifies if its previous node has preserved the integrity of the packet using the secret key it shares with two hop...

  • EFFECTIVE VOICE CALLS ADMISSION FOR AUTHORIZED USER IN INTER VOIP NETWORK. Subashri, T.; Vaidehi, V. // International Journal of Network Security & Its Applications;Oct2010, Vol. 2 Issue 4, p213 

    IP based voice transmission technology is a flexible, simpler and a cost effective implementation of voice transmission. It provides a real convergence of various networks. This voice transmission technology does not support a quality that is equivalent to digitized voice, which is available in...

  • The Evolution of LTE towards IMT-Advanced. Parkvall, Stefan; Astely, David // Journal of Communications;Apr2009, Vol. 4 Issue 3, p146 

    This paper provides a high-level overview of some technology components currently considered for the evolution of LTE, referred to as LTE-Advanced. First, a brief overview of LTE and some of its technologies are given and then the IMT-Advanced requirements are discussed. One of the targets with...

  • Survey finds IT leaders spend too much time restoring connections. Mohamed, Arif // Computer Weekly;3/29/2005, p35 

    The article focuses on a survey that reveals that 32% of IT executives spend time managing their networks. The inability to identify network faults affects continuity of service. Senior IT executives are spending one or more days each week managing aspects of their wide area network they would...

  • The promise of broadband wireless. Doucet, Keith // Broadcast Engineering;Dec2004, Vol. 46 Issue 12, p36 

    The article presents information on broadband wireless technology. Broadband wireless technology has resolved many of the signal and performance problems. Technology features available in today's systems now enable broadcasters to embrace unhampered, reliable broadband wireless communications in...

  • Programmers face vertical design challenge for 3G mobile phones. Langley, Nick // Computer Weekly;12/14/2004, p38 

    This article reports that 3G phones offer always-on connectability with enhanced multimedia capabilities such as voice, data and video and higher bandwidth speeds. Several years after they were promised, 3G mobile phones have arrived, but if the industry is to recoup its enormous investment in...

  • Bond's the Game, Copper Bonds. Barthold, Jim // Telecommunications - Americas Edition;Oct2005, Vol. 39 Issue 12, p24 

    Focuses on the efforts of telecommunication companies to bond existing copper pairs to build super-fast and super-wide transportation pipes for both residential and enterprise users. Tendency for these companies to recycle old ideas in creating a new concept; Recommendation for the use of...

  • Broadcasting scheme with low client buffers and bandwidths for video-on-demand applications. Hsiang-Fu Yu; Hung-Chang Yang; Yao-Tien Wang; Ping-Lin Fan; Chu-Yi Chien // Multimedia Tools & Applications;May2009, Vol. 42 Issue 3, p295 

    Abstract  Efficient data broadcasting is independent of request arrivals, and is thus highly promising when transmitting popular videos. A conventionally adopted broadcasting method is periodic broadcasting, which divides a popular video into segments, which are then simultaneously...

  • Improving Adaptability and Per-Core Performance of Many-Core Processors Through Reconfiguration. Suri, Tameesh; Aggarwal, Aneesh // International Journal of Parallel Programming;Jun2010, Vol. 38 Issue 3/4, p203 

    Increasing the number of cores in a multi-core processor can only be achieved by reducing the resources available in each core, and hence sacrificing the per-core performance. Furthermore, having a large number of homogeneous cores may not be effective for all the applications. For instance,...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics