Mobile networking generates new transmission problems that do not occur in classical point-to-point communications. For example, in multi-user wireless network multiple users share a common spectrum. Smart receivers are used to extract multiple information streams efficiently. There are many issues that overlap signal processing and networking, especially on wireless access links where it is difficult to achieve high subjective quality and traffic capability. In this paper the design of wireless data security architecture in secure electronic transactions and WLAN. INTEL WLAN Pilot determined VPNs offer the best security at the moment. Future versions of 802.11 will use encryption to achieve high subjective quality on low-reliability wireless links without requiring VPNs. Both Universal Mobile Telecommunication System (3GPP) and CDMA2000 (3GPP2) wireless security architectures are addressed. © Springer-Verlag Berlin Heidelberg 2003.
CITATION STYLE
Vincze, S. (2003). How secure personal mobility can be? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2667, 238–244. https://doi.org/10.1007/3-540-44839-x_26
Mendeley helps you to discover research relevant for your work.