Abstract
Wireless technology seems to be everywhere now - but it is still relatively in its infancy. New standards and protocols continue to emerge and problems and bugs are discovered. Nevertheless, wireless networks make many things much more convenient and it appears that wireless networks are here to stay. The differences and similarities of wireless and wired security, the new threats brought by mobility, the security of networks and devices and effects of security, or lack of it are shortly discussed in this review paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kytölä, O.: Wireless Technologies in E-Business:Services, Security and Management. LAPPEENRANTA (June 19, 2002)
Ward, E.: World-class telecommunications service development, p. 260. Artech House (1998) ISBN 0-89006-922-0
Paavilainen, J.: Mobile Commerce Strategies, p. 252. IT Press (2001), ISBN 951-826-253-5
Müller-Veerse, et al.: UMTS report – An Investment Perspective. p. 141. Durlacher Research Ltd. (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sattarova, F.Y., Kim, Th. (2010). Review: Security in Wireless Technologies in Business. In: Tomar, G.S., Grosky, W.I., Kim, Th., Mohammed, S., Saha, S.K. (eds) Ubiquitous Computing and Multimedia Applications. UCMA 2010. Communications in Computer and Information Science, vol 75. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13467-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-13467-8_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13466-1
Online ISBN: 978-3-642-13467-8
eBook Packages: Computer ScienceComputer Science (R0)