TITLE

By the Numbers

PUB. DATE
August 2005
SOURCE
Wireless Week;8/1/2005, Vol. 11 Issue 16, p22
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on the trends concerning the telecommunications sector in the U.S. and worldwide as of August 2005. Projection on the total mobile telephone units that will be sold by 2009; Increase in mobile telephone sales in 2005; Findings of a research conducted by software provider Qpass on the security of U.S. and European digital content Web sites; Background on the Advanced Telecom Computing Architecture standard. INSET: Go Figure.
ACCESSION #
17822619

 

Related Articles

  • On Analyzing the Potential of a Layer-2 Multi-hop Authentication and Credential Delivery Scheme for Vehicular Communications. Tchepnda, Christian; Moustafa, Hassnaa; Labiod, Houda; Bourdon, Gilles // Wireless Personal Communications;Nov2009, Vol. 51 Issue 1, p31 

    In this paper we introduce a new security architecture and security mechanisms for vehicular networks providing a layer-2 multi-hop authentication and credential delivery scheme between vehicles and the network operator authentication server. We present a performance analysis of the proposed...

  • Protected session keys context for distributed session key management. Dan Forsberg // Wireless Personal Communications;Oct2007, Vol. 43 Issue 2, p665 

    Abstract  Handoffs must be fast for wireless mobile nodes (MN) without sacrificing security between the MN and the wireless access points in the access networks. We describe and analyze our new secure Session Keys Context (SKC) scheme which has all the good features, like...

  • Self-Organized Monitoring in Ad-Hoc Networks. Remi Badonnel; Radu State; Olivier Festor // Telecommunication Systems;Nov2005, Vol. 30 Issue 1-3, p143 

    We propose in this paper a self-organized monitoring architecture for mobile ad-hoc networks based on a selective scheme where subsets of nodes are managed. These nodes are determined based on their network behavior in order to favor subsets of well-connected nodes. The key idea is to relax the...

  • Ghosts in the machine. Lennighan, Mary // Total Telecom Magazine;Nov2005, p19 

    Focuses on the effect of the resurgence in machine-to-machine (M2M) communications on mobile operators. Call of M2M operators for a universal, or network-independent security identity module (SIM); Introduction of automated wireless meater-reading services offered in European Union countries;...

  • Early Registration: Criterion to Improve Communication-Inter Agents in Mobile-IP Protocol. Mostafa, Hossam el-ddin; Cicak, Pavel // International Journal of Information Technology;2007, Vol. 3 Issue 3, p173 

    In IETF RFC 2002, Mobile-IP was developed to enable Laptobs to maintain Internet connectivity while moving between subnets. However, the packet loss that comes from switching subnets arises because network connectivity is lost while the mobile host registers with the foreign agent and this...

  • Fair and Secure Mobile Billing Systems. Shiqun Li; Guilin Wang; Jianying Zhou; Kefei Chen // Wireless Personal Communications;Nov2009, Vol. 51 Issue 1, p81 

    In the current mobile communication networks, there is no undeniable evidence for calling information in the billing systems. Chen, Jan and Chen proposed a billing system by introducing a trusted third party—Observer and exploiting a hash chain mechanism. In this paper, we first identify...

  • NEWEST MOBILE DEVICES ARE LATEST THREAT TO NETWORK SECURITY. McLaughlin, Kevin // CRN;10/17/2005, Issue 1167, p43 

    This article reports that next-generation mobile devices are placing unprecedented demands on enterprise security infrastructure. Until stronger security practices become more widespread, enterprise mobile devices will continue to represent a threat to sensitive corporate data. Next-generation...

  • RESPONSIVE WEB DESIGNING FOR LIBRARIES. Bhavsar, Sonia // Indian Streams Research Journal;Apr2014, Vol. 4 Issue 3, p1 

    Rapid development is taking place in the field of mobile technology. Libraries seek sustainable ways to keep up with these changes and to best serve our users. From mobile browsers to netbooks and tablets, users are visiting websites from different devices so without wasting users time, websites...

  • How To Create a Mobile-Friendly Website.  // PR News;4/21/2014, Vol. 70 Issue 16, p3 

    The article discusses how to rebuild a website using a mobile-first approach using the mobile design and content as starting point. It notes that the best approach when deciding the content is to consider the single most important thing a mobile user will see or do when they get to the website....

Share

Read the Article

Courtesy of

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics