Bort, Julie
September 2000
Network World;09/11/2000, Vol. 17 Issue 37, p56
Trade Publication
Focuses on the securitization of Wireless Application Protocol (WAP)-based devices. Implementation of a WAP-based electronic customer relationship management application by Memorex Telex Ireland; Ways of fixing security problems in WAP; Proposal of the Wireless Identity Module by Baltimore Technologies and public-key infrastructure vendors. INSETS: WHY SKINNY CONTENT WILL MAKE YOU OUTSOURCE.;HYPE MACHINE IN FULL THROTTLE..


Related Articles

  • Corporate GPRS--a new ARPU hope. Secker, Matthew // Telecommunications - International Edition;Dec2000, Vol. 34 Issue 12, p57 

    Reports that the corporate sector could boost the demand for general packet radio services, extending the life of the wireless application protocol (WAP). Lessons from the WAP marketing drive; Development of the third-generation telecommunication system; Concerns about network security.

  • Secure Your Wireless Network. Bloomquist, Jane; Musa, Atif // Tech & Learning;Apr2004, Vol. 24 Issue 9, p20 

    The article offers tips and advice on dealing with the security problems encountered by schools that use wireless network systems. For starters, most traditional network security methods schools are used to employing are incompatible with wireless technology, unlike wired networks, signals...

  • Wireless Application Protocol.  // Network Dictionary;2007, p529 

    A reference entry for "Wireless Application Protocol" is presented. In the context of network security, this refers to a group of related technologies and protocols used as a de facto standard protocol in providing Internet access to mobile phones or other thin-client devices. A Web site...

  • BULLET PROOF.  // Machine Design;10/23/2008, Vol. 80 Issue 20, p44 

    The article discusses the security management for wireless technology. It is stated that the common problem with wireless security has been a proliferation of shareware that can discover the key used to authenticate users over a wireless link. The preferred approach for security includes...

  • Untangling RFID Privacy Models. Coisel, Iwen; Martin, Tania // Journal of Computer Networks & Communications;2013, p1 

    The rise of wireless applications based on RFID has brought up major concerns on privacy. Indeed nowadays, when such an application is deployed, informed customers yearn for guarantees that their privacy will not be threatened. One formal way to perform this task is to assess the privacy level...

  • IETF nixes wiretapping, eyes wireless. Marsan, Carolyn Duffy // Network World;03/27/2000, Vol. 17 Issue 13, p10 

    Reports on the decision of the Internet Engineering Task Force to reject proposals for a protocol that would enable law enforcement agencies to intercept communications on the Internet. Policy against building wiretapping capability into the protocols; Plans of the group to focus on the...

  • WAP Identity Module.  // Network Dictionary;2007, p521 

    An encyclopedia entry for "Wireless Application Protocol (WAP) Identity Module" (WIM) in wireless communication is presented. It refers to the security module implemented in the Subscriber Identity Module card for WAP applications. Some of the functionalities of WIM include providing security...

  • Wireless Transport Layer Security.  // Network Dictionary;2007, p531 

    A definition of the term "wireless transport layer security (WTLS)" is presented. It refers to a protocol in the Wireless Application Protocol (WAP) suite based on Transport Layer Security (TLS). The WTLS is designed to support narrow-band networks and to be used with other WAP protocols. In...

  • A Simple Encryption Keys Creation Scheme in Wireless Ad Hoc Networks. Altalhi, Abdulrahman H. // Communications & Network;Feb2012, Vol. 4 Issue 1, p83 

    A mobile ad hoc network (MANET) is a collection of mobile nodes that temporarily integrate with each other to form a network. Such a network does not require the existence of a typical network infrastructure. There is no central entity with the authority to administer the services and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics