The design of a secure communication scheme for Radio Frequency IDentification (RFID) systems has been extensively studied in recent years in view of the awareness of individual privacy and the requirement of robust system security. Most of previous works assume the communication channel between an
Mobile Security — New Needs on New Devices
- Publisher
- Elsevier Science
- Year
- 2002
- Tongue
- English
- Weight
- 258 KB
- Volume
- 2002
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
✦ Synopsis
Anytime, anywhere on any device
Marketing tells us that a new era of mobility has just begun. Millions of socalled Personal Digital Assistants (PDA) have been sold over the past few years. Together with other mobility technologies like notebooks, mobile phones, wireless LAN, Bluetooth etc. they definitely increase the possibilities for locations and situations where we can access computing power and digital information.
PDAs started to become successful by being privately owned and controlled devices of managers and early adopters to manage their personal information. Applications like calendar, address book, notes, calculator etc. are already built-in. Others like restaurant guides, dictionaries, MP3 players etc. followed and made the devices more successful.
PDAs meanwhile can have storage capacities of several hundred megabytes, and offer full-fledged network access to the Internet or a local company LAN. This gives some IT managers a headache. Current IT security concepts often address only 'traditional' systems like servers, workstations and the network. Furthermore, controlling privately owned computational devices may also be a difficult organizational and political issue, but still needs to be addressed.
📜 SIMILAR VOLUMES
There is an old Peanuts strip where Charlie Brown says, "Working here is like wetting your pants in the pool, wearing a dark bathing suit. You get that warm feeling but nobody notices." Increasingly, I think computer security professionals in large enterprises are in that metaphorical swimming pool.
Backdoor closes, for now, on crypt0 plan, John Rendleman. In the United States, the House Energy and Commerce Committee recently defeated a proposal that would have required encryption products to include a 'backdoor' for law enforcement officials. In its place, the Commerce Committee approved a mor