TITLE

Securing wireless transactions

AUTHOR(S)
Chen, Anne
PUB. DATE
April 2001
SOURCE
eWeek;04/02/2001, Vol. 18 Issue 13, p44
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Predicts the extension of the security and identity verification capabilities of public-key infrastructure in wired transactions in the United States to wireless transactions. Modification of public-key infrastructure products for mobile applications; Enabling of wireless users to encrypt their over-the-air communications.
ACCESSION #
4317272

 

Related Articles

  • A matter of trust: Wireless PKI's identity crisis. Tanner, John C. // Wireless Asia;Mar2002, Vol. 5 Issue 2, p18 

    Discusses the advantages and risks associated with public key infrastructure features of wireless communication systems. Use of encryption technology to create digital signatures authenticating a transaction; Complications due to Java applications; Challenge of gaining public trust. INSET: How...

  • Who Holds the Keys? Carrara, Jean-Louis // Wireless Review;12/01/2000, Vol. 17 Issue 23, p68 

    Stresses the use of a public-key infrastructure encryption approach to ensure security in mobile commerce transactions. Basis of wireless mobile commerce efforts; How a public key would be used by a merchant; Applications of subscriber identity module cards. INSET: A Global Lock.

  • Cutting-Edge Security. Crowe, David // Wireless Review;01/01/2001, Vol. 18 Issue 1, p40 

    Provides information on public-key encryption and private-key encryption as security systems for use in wireless business. Advantages and disadvantages of public-key encryption and private-key encryption; Authenticity of wireless security.

  • Insecurity of a certificateless aggregate signature scheme. Zhang, Hui // Security & Communication Networks;7/25/2016, Vol. 9 Issue 11, p1547 

    As an important kind of digital signature, the aggregate signature could aggregate n signatures into a signature and verify those signatures simultaneously. It is suitable for the constrained environment with limited ability of computation and communication. Recently, Chen et al. proposed a...

  • An Optimization of Tree Topology Based Parallel Cryptography. Damrudi, Masumeh; Ithnin, Norafida // Mathematical Problems in Engineering;2012, Vol. 2012, Special section p1 

    Public key cryptography has become of vital importance regarding the rapid development of wireless technologies. The RSA is one of the most important algorithms for secure communications in public-key cryptosystems. Since the RSA is expensive in terms of computational task which is modular...

  • DESIGN OF MOBILE PUBLIC KEY INFRASTRUCTURE (M-PKI) USING ELLIPTIC CURVE CRYPTOGRAPHY. Ray, Sangram; Biswas, G. P. // International Journal on Cryptography & Information Security;Mar2013, Vol. 3 Issue 1, p25 

    Recently the demand of mobile phones and their applications are increasing rapidly and as a result, it becomes essential to design and/or improve the existing PKI (Public Key Infrastructure) useful for mobile phones or devices. Since a mobile phone has small screen, low computing power, small...

  • A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOBILE BANKING. Masamila, Bossi // International Journal of Network Security & Its Applications;Nov2013, Vol. 5 Issue 6, p31 

    Mobile phones are considered to be the most common devices in history of humankind. They have involved in financial transaction such as mobile banking and mobile payment, which include sensitive information. Public key cryptography is the proven solution that can provide secure transaction at...

  • Privacy Enhanced Key Agreement for Public Safety Communication in Wireless Mesh Networks. Qian Wei; Jingsha He; Xing Zhang // Journal of Networks;Sep2011, Vol. 6 Issue 9, p1351 

    With the requirements of mobility, flexibility, and rapid response, wireless mesh networks are widely used for emergency services to improve the efficiency of public safety communication to prevent or respond to incidents that harm or endanger persons or property. In this paper, we propose a...

  • Advanced Security Technologies and Services for Future Computing Environments. Jeong, Young-Sik; Sauveron, Damien; Park, Jong Hyuk // Computer Journal;Oct2013, Vol. 56 Issue 10, p1151 

    The objectives of this special issue are advanced security technologies and services for future computing environments, including, but not limited to, security primitives, protocols and security applications and services. Recent advances in security technologies and services for future computing...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics