One if by Land

Keggler, Johnny
October 2002
Armada International;2002, Issue 5, p74
Focuses on communications security in military operations. Main problem in wireless communication; Information on the fingerprint sensor of AuthenTec; Discussion on the communications technique called cryptography. INSET: Anyone Can Get In.


Related Articles

  • COMMERCIAL MARKET. Massé, Dan // Microwave Journal;Oct2010, Vol. 53 Issue 10, p53 

    The article offers world news briefs related to the military communication equipment industry. The worldwide installed base of digital radio receivers was projected to reach almost 200 million units in 2015. The gallium arsenide (GaAs) market has continued to grow toward the end of 2009 due to...

  • Military radios rely on X[G] factor. Mohney, Doug // Mobile Radio Technology;Oct2004, Vol. 22 Issue 10, p18 

    The article discusses the use of Next Generation (XG) program, designed to address military and civilian user demand for greatly increasing amounts of spectrum. The U.S. military needs more spectrum, which is short in supply, to foster its new philosophy of network-centric warfare, which calls...

  • A matter of trust: Wireless PKI's identity crisis. Tanner, John C. // Wireless Asia;Mar2002, Vol. 5 Issue 2, p18 

    Discusses the advantages and risks associated with public key infrastructure features of wireless communication systems. Use of encryption technology to create digital signatures authenticating a transaction; Complications due to Java applications; Challenge of gaining public trust. INSET: How...

  • E-signature Laws Boost Mobile Security Efforts. Smith, Brad // Wireless Week;09/18/2000, Vol. 6 Issue 38, p18 

    Focuses on mobile security specialist Certicom Incorporated's MobileTrust Certificate Authority, an application which provides digital certificates for wireless applications. Purpose of the application; Suitability of elliptic curve cryptography to wireless devices and network; Business plan of...

  • Air space up for sale.  // Network World;4/10/2006, Vol. 23 Issue 14, p6 

    The article reports on the planned sale of ARINC, a military and aviation communications company. Goldman Sachs is handling the purchase, but there have been no reported buyers so far. ARINC supplies wireless systems to the U.S. military that allows all its branches to communicate over many...

  • Transmission over Cognitive Radio Channel with Novel Secure LT Code. Hosseini, Elham; Falahati, Abolfazl // Communications & Network;Aug2013, Vol. 5 Issue 2, p198 

    With the increasing of communication applications in recent years, the demand for radio spectral resources has increased significantly. Cognitive radio scenario was proposed to improve spectrum efficiency in wireless communication systems. In cognitive radio network, it is essential that control...

  • Banking on Security. Goldman, Chris // Wireless Review;04/01/2001, Vol. 18 Issue 7, p22 

    Discusses public key infrastructure (PKI), a security solution for wireless communication systems. Role of public key cryptography in PKI; Certificate authority of PKI; PKI product of 724 Solutions; PKI solution from Baltimore Technologies; Impact of PKI on wireless carriers' opportunity to...

  • Applications of Fast Truncated Multiplication in Cryptography. Hars, Laszlo // EURASIP Journal on Embedded Systems;2007 Regular Issue, p1 

    Truncated multiplications compute truncated products, contiguous subsequences of the digits of integer products. For an n-digit multiplication algorithm of time complexity O(na), with 1 < α ⩽ 2, there is a truncated multiplication algorithm, which is constant times faster when computing...

  • A Novel Approach for Security Enhancement in Dynamic Routing. Nagamalleswari, P.; Srinivasulu, P.; Kumar, G. Kranthi; Rangarao, J. // International Journal of Computer Science Engineering & Technolo;May2011, Vol. 1 Issue 4, p176 

    In this project we deal fully about the security which has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of cryptography algorithms and system infrastructures, we will propose a dynamic routing algorithm that...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics