Security Report Could Cast Chill

Vaughan, Allyson
August 2002
Wireless Week;8/19/2002, Vol. 8 Issue 31, p1
Trade Publication
Reveals that a federal government report in the U.S. found that emerging wireless technologies pose security risks. Efforts to address security risks; Advice to U.S. government agencies; Plan of the U.S. Defense Department to reduce technological vulnerabilities.


Related Articles

  • Don't Be Out'smart'ed. Panettieri, Joseph C. // T H E Journal;Feb2006, Vol. 33 Issue 7, p18 

    The article discusses the threats posed by smart mobile phones to data security. More than 100 viruses now target smart phones running mobile operating systems from several high technology companies including Microsoft Corp. Consider the Cabir worm, which targets mobile phones running Symbian OS...

  • Portal Protection. Swartz, Nikki // Wireless Review;10/15/2001, Vol. 18 Issue 20, p39 

    Describes the portal security models necessary for wireless third generation (3G) networks. Limitations of the security systems for wireless application protocols; Importance of 3G networks portal security on subscriber transactions; Role of 3G networks portal security on the development of...

  • SECURITY INSIGHTS ON M-COMMERCE IN ADHOC WIRELESS NETWORK. Chitra, Kiran N; Kumar, G. Narendra // World Journal of Science & Technology;2011, Vol. 1 Issue 12, p6 

    The proposed research highlights about the usage of mobile commerce system in the environment of adhoc wireless network, which is one of the emerging trend in mobile applications with huge demands. Although many such products has already found its position in the commercial place, but every...

  • Firms on high alert to boost security. Fineberg, Seth // Accounting Today;Jan2012, Vol. 26 Issue 1, p26 

    The article discusses the initiative of certified public accounting firms to boost information security. The firms vulnerability to data theft and online security breaches are attributed to new mobile devices and old legacy systems. The firms have vowed to make information technology security a...

  • MOBILE SECURITY USING SUPERVISED LEARNING. Pundir, P. R.; Gomase, V. S. // International Journal of Computational Intelligence Techniques;2012, Vol. 3 Issue 1, p65 

    Wireless networks in small or large coverage are increasingly popular as they promise the expected convergence of voice and data services while providing mobility to users. Combining with current wireless communications infrastructure, wireless computing infrastructure and mobile middleware,...

  • Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Jun-Sub Kim; Jin Kwak // International Journal of Security & Its Applications;2012, Vol. 6 Issue 3, p45 

    The user authentication scheme in a global mobility network is an important security issue that allows users of mobile devices to access a secure roaming service through wireless networks. Over recent years, many anonymous authentication schemes have been proposed for roaming services in global...

  • Development of Multi Agent for Adapting Convergence Applications. Younky Chung // International Journal of Smart Home;Jul2013, Vol. 7 Issue 4, p297 

    Mobile agents provide an attractive conceptual framework for mobile device-based computing — small threads migrating from server to server, performing their functions, there are still many difficulties that must be addressed. These difficulties are currently preventing the widespread...

  • Protect mobile device data.  // Communications News;Oct2003, Vol. 40 Issue 10, p6 

    Stresses the importance of protecting mobile device data. Incidence in which a company gains a vested interest in protecting mobile device data; Steps to take when a device is lost or stolen; Benefits from device-management solutions.

  • A Performance Comparison and Evaluation of Analysing Node Misbehaviour in MANET using Intrusion Detection System. Pari, S. Neelavathy; Sridharan, D. // International Journal of Computer Science Engineering & Technolo;Feb2011, Vol. 1 Issue 1, p35 

    This Paper presents a coherent survey on to detect the misbehaving node in Mobile Ad hoc Network (MANET) with the intent of serving as a quick reference to the current research issues in MANET. A mobile ad-hoc network is an infrastructure less network, that is self-configuring mobile nodes...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics