TITLE

Why ECC Is The Wave Of The Future

AUTHOR(S)
Vanstone, S. A.
PUB. DATE
March 2004
SOURCE
Wireless Week;3/15/2004, Vol. 10 Issue 6, p45
SOURCE TYPE
Trade Publication
DOC. TYPE
Editorial
ABSTRACT
Comments on the use of Elliptic Curve Cryptography (ECC) in building security into public key systems in the U.S. Importance of ECC to wireless devices; Benefits of ECC to corporations; Use of ECC in the U.S. National Security Agency.
ACCESSION #
12497076

 

Related Articles

  • MISSI not ready for action. Von Schweber, Erick // PC Week;05/04/98, Vol. 15 Issue 18, p132 

    Discusses the Multilevel Information Systems Security Initiative (MISSI), a computer network security initiative developed by the United States National Security Agency (NSA) to support national defense operations. Potential commercial uses of MISSI; Questions about the support that the NSA...

  • Pentagon seen backing off hard-line wireless stance. Messmer, Ellen // Network World;2/10/2003, Vol. 20 Issue 6, p1 

    Reports that the United States government is expected to finalize wireless rules outlined in the 'DoD overaching wireless policy'. Policy to be based on technical input from the National Security Agency (NSA); Baseline for security measures to protect top-secret data and unclassified materials;...

  • AOC ASSOCIATION NEWS.  // Journal of Electronic Defense;Feb2006, Vol. 29 Issue 2, p66 

    The article reports on the December 2005 technical luncheon held at the Kelly Field Club in San Antonio, Texas, which has been sponsored by the Billy Mitchell Chapter of the Association of Old Crows and the Alamo Chapter of the Armed Forces Communications Electronics Association. The two...

  • The Exaggerated Cyber-War Threat (Ctd.). Windish, Joe // Moderate Voice;10/29/2010, p19 

    The article reports on the drop of networks in 2010 despite cyber-war threat on pentagon attacks in the U.S. The figures compiled by the U.S.-China Economic and Security Review Commission state that about 30,000 happened in the first six months of 2010. The U.S. National Security Agency/Central...

  • Telecom giants remain in wiretapping crosshairs. Silva, Jeffrey // RCR Wireless News;6/11/2007, Vol. 26 Issue 22, p15 

    The article reports that Wireless and wireline carriers remain vulnerable to lawsuits over the National Security Agency's antiterrorist wiretapping program. In its authorization bill report, the Senate Intelligence Committee said it cannot take up the administration's draft legislation until the...

  • The Beltway Battle for CYBER TURF. LEGGIERE, PHILIP // HS Today;Jul2009, Vol. 6 Issue 7, p27 

    The article talks about cybersecurity in the U.S. It offers an overview of the initiatives of U.S. President Bill Clinton to address the future implications of cyber attacks. The author discussed the policies and efforts of U.S. President Barack Obama with regard to national cybersecurity and...

  • Security best practices. Andress, Mandy // InfoWorld;3/18/2002, Vol. 24 Issue 11, p28 

    Discusses the approaches in implementing computer security in the U.S. Information on the Security Consensus Operational Readiness Evaluation project from the System Administration, Networking and Security Institute; Details of the Open Web Application Security Project; Publication of...

  • NSA-linked carriers face tough issues. Johnson, Johna Till // Network World;5/22/2006, Vol. 23 Issue 20, p33 

    The article focuses on the issues faced by AT&T Corp., Verizon Communications Inc. and BellSouth Corp. as they are alleged to provide the U.S. National Security Agency with call-record-detail databases. The internal databases purportedly handed over are homegrown software applications that...

  • 10 security threats to watch for. Greene, Tim // Network World;4/14/2008, Vol. 25 Issue 15, p30 

    The article reports on the various security threats on business networks in the U.S. One is virtual host security, virtualization creates new security problems because it allows different virtual hosts to reside in the hardware where the traffic between them is difficult to monitor and screen....

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics