i3Mobile introduces security feature

September 2000
RCR Wireless News;9/25/2000, Vol. 19 Issue 39, p16
Trade Publication
Features the wireless portal developed by i3Mobile Inc. for security service providers to detect threats to information systems and networks in Stamford, Connecticut.


Related Articles

  • Don't Pretend, Defend. Williamson, John // Global Telephony;Jul2000, Vol. 8 Issue 7, p18 

    Discusses the need for wireless operators to be on guard against fraud and security breaches. Projected growth of telecommunication and information technology fraud and security concerns; Operators and end users' need to be familiar with how their network or service could be hit by fraud;...

  • Proprietary fixes for WAP security gap. Chan, Tony // Telecom Asia;Feb2000, Vol. 11 Issue 2, p20 

    Cites the technical issues concerning the wireless application protocol (WAP) technology. Incorporation of Wireless Transport Layer Security; Need for another form of encryption at the section of the network between the gateway and server; WAP security solutions.

  • .8% down, 3% to go. Boney, Karissa // Cellular Business;Dec97, Vol. 14 Issue 13, p6 

    Opinion. Presents the author's view on the decreasing claim of wireless fraud as seen in the percentage of the telecommunications industry's overall revenue stream in United States for the year 1996. Obstacles put up by carriers and vendors for cloners; Advice of the author to carriers in...

  • Bluetooth Bulletin. Beach, Tarre // Wireless Review;07/15/2000, Vol. 17 Issue 14, p46 

    Focuses on the Bluetooth technology, a short-range radio link for the wireless industry. How Bluetooth-enabled devices can minimize interference; Levels of security of Bluetooth's operation modes; Other forms of security Bluetooth uses; Qualification program developed to ensure its...

  • Securing wireless transactions. Chen, Anne // eWeek;04/02/2001, Vol. 18 Issue 13, p44 

    Predicts the extension of the security and identity verification capabilities of public-key infrastructure in wired transactions in the United States to wireless transactions. Modification of public-key infrastructure products for mobile applications; Enabling of wireless users to encrypt their...

  • Wireless security is a crucial issue. Lundquist, Eric // PC Week;02/28/2000, Vol. 17 Issue 9, p110 

    Discusses the need for building a secure, Internet-based infrastructure for wireless communication applications. Requirement of constant care, funding and rapid prototyping and deployment; Lessons learned by the industry from the denial of service (DoS) hacker attacks in February 2000; Need for...

  • Authentication: The New Generation. Crowe, David // Wireless Review;11/01/98, Vol. 15 Issue 21, p46 

    Announces that the Tax Institute of America (TIA) is planning to increase wireless communications security in response to a published criticism. Reason for the unique challenges of developing security algorithms; Basis of encryption algorithms for cellular authentication and voice encryption...

  • CHAOS BASED MIXED KEYSTREAM GENERATION FOR VOICE DATA ENCRYPTION. Ahmad, Musheer; Alam, Bashir; Farooq, Omar // International Journal on Cryptography & Information Security;Mar2012, Vol. 2 Issue 1, p39 

    In this paper, a high dimensional chaotic systems based mixed keystream generator is proposed to secure the voice data. As the voice-based communication becomes extensively vital in the application areas of military, voice over IP, voice-conferencing, phone banking, news telecasting etc. It...

  • France rings in anti--cell tech. Klaussmann, Liza // Daily Variety;10/18/2004, Vol. 285 Issue 11, p30 

    Reports on the cellular phone scramblers to be installed in cinemas in France to lure back moviegoers and help the motion picture industry.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics