TITLE

Keying Into Security

AUTHOR(S)
Smith, Brad
PUB. DATE
May 2003
SOURCE
Wireless Week;5/1/2003, Vol. 9 Issue 10, p6
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on the issue on security in the wireless communication industry. Concerns on wireless telecommunication security; Glossary of security terms; Features of the Universal Mobile Telecommunications System Security Architecture. INSETS: Features Of UMTS Security Architecture;Types Of Security Attacks On A GSM Network.
ACCESSION #
9659190

 

Related Articles

  • Engineers look for ways to encrypt key information.  // Journal of Business (10756124);6/30/2011, Vol. 26 Issue 14, pA13 

    The article reports on the proposed selective encryption technique conducted by researchers from South Dakota State University which will protect importance content in streaming video over wireless networks in the U.S.

  • Anti-virus Suppliers Prepare For Onslaught. Albright, Peggy // Wireless Week;09/04/2000, Vol. 6 Issue 36, p38 

    Reports on the emerging solutions that could protect wireless devices from possible viruses. Prototype anti-virus engine from Symantec Anti-Virus Research Center; Two distinctions of McAfee's anti-virus product; Web site for downloading McAfee product.

  • Unchained connections. Zieger, Anne // Frontline Solutions;Aug2003, Vol. 4 Issue 8, p24 

    Focuses on how Wi-Fi systems that incorporate wireless technology can boost productivity and efficiency in business enterprises. Factors that have impeded the development of Wi-Fi technology; Ways in which 'Wi-Fi Protected Access', a Wi-Fi security standard offers stronger data protection for...

  • NEURO GENETIC KEY BASED RECURSIVE MODULO-2 SUBSTITUTION USING MUTATED CHARACTER FOR ONLINE WIRELESS COMMUNICATION (NGKRMSMC). Sarkar, Arindam; Mandal, J. K. // International Journal of Computer Science & Information Technolo;Nov2013, Vol. 5 Issue 6, p49 

    In this paper, a neural genetic key based technique for encryption (NGKRMSMC) has been proposed through recursive modulo-2 substitution using mutated character code generation for online wireless communication of data/information. Both sender and receiver get synchronized based on their final...

  • Editor's Note. Depperschmidt, Nick // Remote Site & Equipment Management;Oct/Nov2009, Vol. 9 Issue 6, p3 

    The article discusses various reports published within the issue, including one on how the smart grid is being enabled through cutting edge electrical load management, another on overpressure protection through wireless communications and data driven device management, and an article on...

  • LAPTOP NATION. Breen, Christopher // Macworld;Nov2003, Vol. 20 Issue 11, p58 

    Examines how wireless and networking technologies resolve several laptop-computing issues. Ways to protect data on the laptop; Steps in printing data from the Internet; Examples of such technologies.

  • Performance Tuning of Data Transfer in Vehicular Networks. Dinakaran, M.; Balasubramanie, P. // International Journal of Computer Science Issues (IJCSI);Jan2012, Vol. 9 Issue 1, p350 

    Uninterrupted connectivity to Internet services during mobility is an increased demand nowadays. When a user is traveling through a vehicle like car or train, it is important to have a continuous Internet connection without connection break-ups and data losses. This vehicular Internet...

  • Q&A MOBILE VACATIONS. Donaldson, Sonya A. // Black Enterprise;Jul2003, Vol. 33 Issue 12, p48 

    Answers a question on choosing telecommunication systems for a working vacation. Advantage of choosing a hotel with a wireless connection; Suggested products and services for wireless connections; Importance of loading antivirus software.

  • Survey reveals increasing risk of sloppy mobile security habits.  // Credit Control;2005, Vol. 26 Issue 8, p47 

    The article reports on the increasing risk of sloppy mobile security habits in Great Britain, according to "The Mobile Usage Survey 2005." The survey found that 30 percent of mobile device users do not use passwords or any other security protection. And yet, three out of ten use mobile devices...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics