New Security Solution To Replace WEP

November 2002
Wireless Week;11/4/2002, Vol. 8 Issue 40, p12
Trade Publication
Reports on the support of companies for the Wi-Fi Protected Access of Wi-Fi Alliance to replace the Wired Equivalent Privacy. Design of the solution; Target application of the Wi-Fi Protected Access.


Related Articles

  • Carriers eye SIM cards to combat cellular fraud. Vittore, Vince // America's Network;3/15/95, Vol. 99 Issue 6, p40 

    Reports on the use of subscriber identity module (SIM) by personal communication services (PCS) providers to minimize cellular fraud. Features of the SIMs; Commitment of GO Communications to the SIM card concept; Use of the SIMs with DCS1900; Concerns regarding the American market's air...

  • Risk assessment. Meyers, Jason // Telephony;08/11/97, Vol. 233 Issue 6, p6 

    Warns wireless users about the security and privacy risks posed by different modes of wireless transmission. Evaluation of wireless systems by the US National Institute of Science and Technology and the National Security Agency; Study establishing models of potential threats; Security...

  • Running out of MINs. Crowe, David // Wireless Review;06/01/98, Vol. 15 Issue 11, p74 

    Discusses the importance of the mobile identification number (MIN) in the wireless communications systems industry. Major wireless technology that do not use the MIN identifier; Reason behind the shortage of MIN codes; Potential sources of MIN codes.

  • In transport.  // Electronic News (10616624);11/15/93, Vol. 39 Issue 1989, p4 

    Reports on the International Electrical & Electronic Engineering (IEEE) 802.11 committee's approval of a draft protocol for the media access control (MAC) layer for wireless transmission. Joint proposal by NCR, Symbol Technologies and Xircom; Introduction of silicon development.

  • The Keys to Wireless Security. Crenshaw, Scott // Wireless Design & Development;Oct2000, Vol. 8 Issue 10, p13 

    Explains security systems and applications with potential applications for wireless communication. Description of a security system that requires frequent exchanges of public keys; Implementation of a cryptosystems based on factorization and discrete logarithm.

  • TECHNOLOGY REVIEW. Samson, Steve // Wireless Design & Development;Oct2000, Vol. 8 Issue 10, p28 

    Explains strategies for establishing a secure commerce and information infrastructure for the wireless Internet. Importance of recognizing the bandwidth limitations of wireless Internet; Range of security options offered by standards such as the Wireless Identification Module (WIM).

  • Securing Wireless Networks Outside the Boardroom. Ghai, Bill // San Diego Business Journal;2/18/2002, Vol. 23 Issue 7, p23 

    Focuses on the management and planning of wireless networks outside the boardroom. Security measures for wireless networks; Lists of security measures for wireless networks; Advantage of security measures in corporate networks.

  • Barbarians at the gate. Kridel, Tim // Wireless Review;08/15/98, Vol. 15 Issue 16, p56 

    Focuses on the implementation of authentication to combat cloning fraud. BellSouth's supplementation of authentication with radio frequency (RF) finger-printing and its purpose; Other ways to strengthen authentication; Its vulnerability; Authentication trends and success.

  • Invincible. Crowe, David // Wireless Review;03/01/2000, Vol. 17 Issue 5, p47 

    Discusses the security and reliability of wireless communication systems. Details on smart cards; Examples of attacks on the security of wireless communication services; Information on the loading capacity of wireless communication systems.

  • Will Security Power M-Commerce? Young, Deborah // Wireless Review;04/15/2001, Vol. 18 Issue 8, p12 

    Addresses the issue of security involving mobile and wireless commerce. Security issues that corporations will have to address; Extension of wireline security solutions to wireless devices; Technologies used in mobile commerce.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics