How secure personal mobility can be?

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Mobile networking generates new transmission problems that do not occur in classical point-to-point communications. For example, in multi-user wireless network multiple users share a common spectrum. Smart receivers are used to extract multiple information streams efficiently. There are many issues that overlap signal processing and networking, especially on wireless access links where it is difficult to achieve high subjective quality and traffic capability. In this paper the design of wireless data security architecture in secure electronic transactions and WLAN. INTEL WLAN Pilot determined VPNs offer the best security at the moment. Future versions of 802.11 will use encryption to achieve high subjective quality on low-reliability wireless links without requiring VPNs. Both Universal Mobile Telecommunication System (3GPP) and CDMA2000 (3GPP2) wireless security architectures are addressed. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Vincze, S. (2003). How secure personal mobility can be? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2667, 238–244. https://doi.org/10.1007/3-540-44839-x_26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free