TITLE

Security: Everyone Has A Stake

AUTHOR(S)
Dziatkiewicz, Mark
PUB. DATE
September 2000
SOURCE
Wireless Week;09/18/2000, Vol. 6 Issue 38, p22
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Discusses issues on the adoption of security measures in the wireless communication industry. Response of several carriers on the issue; Information on global industry initiatives for secure mobile transactions.
ACCESSION #
3587042

 

Related Articles

  • Wireless security is a crucial issue. Lundquist, Eric // PC Week;02/28/2000, Vol. 17 Issue 9, p110 

    Discusses the need for building a secure, Internet-based infrastructure for wireless communication applications. Requirement of constant care, funding and rapid prototyping and deployment; Lessons learned by the industry from the denial of service (DoS) hacker attacks in February 2000; Need for...

  • Authentication: The New Generation. Crowe, David // Wireless Review;11/01/98, Vol. 15 Issue 21, p46 

    Announces that the Tax Institute of America (TIA) is planning to increase wireless communications security in response to a published criticism. Reason for the unique challenges of developing security algorithms; Basis of encryption algorithms for cellular authentication and voice encryption...

  • CHAOS BASED MIXED KEYSTREAM GENERATION FOR VOICE DATA ENCRYPTION. Ahmad, Musheer; Alam, Bashir; Farooq, Omar // International Journal on Cryptography & Information Security;Mar2012, Vol. 2 Issue 1, p39 

    In this paper, a high dimensional chaotic systems based mixed keystream generator is proposed to secure the voice data. As the voice-based communication becomes extensively vital in the application areas of military, voice over IP, voice-conferencing, phone banking, news telecasting etc. It...

  • Security, Privacy Ready For Long Haul. Smith, Brad // Wireless Week;10/28/2002, Vol. 8 Issue 39, p14 

    Focuses on a white paper presented at the Cellular Telecommunication & Internet Association's Wireless Internet Caucus which deals with the issues of privacy and security of wireless subscribers. Step in providing security and privacy for wireless subscribers; Actions being taken by wireless...

  • Carriers eye SIM cards to combat cellular fraud. Vittore, Vince // America's Network;3/15/95, Vol. 99 Issue 6, p40 

    Reports on the use of subscriber identity module (SIM) by personal communication services (PCS) providers to minimize cellular fraud. Features of the SIMs; Commitment of GO Communications to the SIM card concept; Use of the SIMs with DCS1900; Concerns regarding the American market's air...

  • Risk assessment. Meyers, Jason // Telephony;08/11/97, Vol. 233 Issue 6, p6 

    Warns wireless users about the security and privacy risks posed by different modes of wireless transmission. Evaluation of wireless systems by the US National Institute of Science and Technology and the National Security Agency; Study establishing models of potential threats; Security...

  • Running out of MINs. Crowe, David // Wireless Review;06/01/98, Vol. 15 Issue 11, p74 

    Discusses the importance of the mobile identification number (MIN) in the wireless communications systems industry. Major wireless technology that do not use the MIN identifier; Reason behind the shortage of MIN codes; Potential sources of MIN codes.

  • In transport.  // Electronic News (10616624);11/15/93, Vol. 39 Issue 1989, p4 

    Reports on the International Electrical & Electronic Engineering (IEEE) 802.11 committee's approval of a draft protocol for the media access control (MAC) layer for wireless transmission. Joint proposal by NCR, Symbol Technologies and Xircom; Introduction of silicon development.

  • The Keys to Wireless Security. Crenshaw, Scott // Wireless Design & Development;Oct2000, Vol. 8 Issue 10, p13 

    Explains security systems and applications with potential applications for wireless communication. Description of a security system that requires frequent exchanges of public keys; Implementation of a cryptosystems based on factorization and discrete logarithm.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics