Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security Architectures of Mobile Computing

Security Architectures of Mobile Computing
View Sample PDF
Author(s): Kaj Grahn (Arcada Polytechnic, Finland), Göran Pulkkis (Arcada Polytechnic, Finland), Jonny Karlsson (Arcada Polytechnic, Finland) and Dai Tran (Arcada Polytechnic, Finland)
Copyright: 2009
Pages: 14
Source title: Mobile Computing: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): David Taniar (Monash University, Australia)
DOI: 10.4018/978-1-60566-054-7.ch202


View Security Architectures of Mobile Computing on the publisher's website for pricing and purchasing information.


Mobile Internet users expect the same network service quality as over a wire. Technologies, protocols, and standards supporting wired and wireless Internet are converging. Mobile devices are resource constrained due to size, power, and memory. The portability making these devices attractive also causes data exposure and network penetration risks. Mobile devices can connect to many different wireless network types, such as cellular networks, personal area networks, wireless local area networks (WLANs), metropolitan area networks (MANs), and wide area networks (satellite-based WANs). Wireless network application examples are e-mailing, Web browsing, m-commerce, electronic payments, synchronization with a desktop computer, network monitoring/management, and reception of video/audio streams.

Related Content

Aysu Altaş. © 2022. 23 pages.
Anusha Thakur. © 2022. 20 pages.
Yigit Yurder, Mehmet Altug Sahin. © 2022. 28 pages.
Anusha Thakur. © 2022. 26 pages.
Ali Yuce. © 2022. 22 pages.
Khouloud Mouihbi, Nedra Bahri-Ammari, Daouda Coulibaly. © 2022. 25 pages.
Anusha Thakur. © 2022. 17 pages.
Body Bottom