Wireless Essays (Examples)

Filter results by:

 

View Full Essay

Latest Network Media Technology

Words: 779 Length: 2 Pages Document Type: Essay Paper #: 82849574

Wireless Solution

The author of this report has been asked to assess and offer recommendations regarding the network setup for ichton Toys. There is currently a fairly dated but operational Cat5 setup in the office area, which is located on half a floor of a thirty floor office building. However, some users have taken to using an 802.11b wireless network. The Chief Executive Officer of ichton is very concerned about the wireless security of that setup given that corporate espionage in the toy industry is rampant. The author will give some recommendations about what should be done and why. While the existing Cat5 setup is not a completely dinosaur, the use of an extremely outmoded wireless technology and security standard is a disaster waiting to happen.

Analysis

The one thing that absolutely must change with the ichton internet access setup is the wireless technology in use. The 802.11b router that…… [Read More]

References

Beal, V. (2015). What is Cat-7? Webopedia. Webopedia.com. Retrieved 10 August 2015, from http://www.webopedia.com/TERM/C/Cat_7.html

Cable Organizer. (2015). What Is The Difference Between Cat 5, Cat 5e, and Cat 6 Cable?. Cableorganizer.com. Retrieved 10 August 2015, from http://www.cableorganizer.com/articles/cat5-cat5e-cat6.htm

HTCC. (2015). WPA2 Encryption Basics. Cybercoyote.org. Retrieved 10 August 2015, from http://cybercoyote.org/classes/wifi/wpa2.shtml

Kelly, G. (2014). 802.11ac vs. 802.11n WiFi: What's The Difference?. Forbes. Retrieved 10 August 2015, from http://www.forbes.com/sites/gordonkelly/2014/12/30/802-11ac-vs.-802-11n-wifi-whats-the-difference/
View Full Essay

Protocol and Network Management

Words: 580 Length: 2 Pages Document Type: Essay Paper #: 8863986

Wireless connections today are ubiquitous and taken for granted; however, there is a complex world at work behind the scenes that relies on highly specific conditions. Whether on a laptop, cell phone, or other wireless handheld device, everyone has experienced the frustration of a faulty wireless signal. For this reason, it is helpful to understand some causes of signal weakness or failure. A brief study of the differences between wired and wireless networks, the basics of multiple access protocols, and increased challenges posed by mobility will offer a basic understanding of the complexities involved in successful wireless data transmission, or what can be described as the "21st century grease of the daily grind."

When a user chooses to "unplug" from the wired internet and connect through a virtual wire instead, they introduce a myriad of problems. Some basic challenges result from the differences between a wired and wireless network: decreasing…… [Read More]

View Full Essay

Municipal Wi-Fi Be Pursued Municipal

Words: 799 Length: 3 Pages Document Type: Essay Paper #: 35351308

City and municipal governments can also benefit greatly from the development of a Municipal Wi-Fi network in that fire, police, safety and medical equipment can be more effectively optimized in its used across broad geographic areas (Zhang, Schiffman, Gibbs, Kunjithapatham, Jeong, 2009). Using these forms of communication would also allow for greater responsiveness to emergency situations and a more effective series of strategies for managing ongoing communications across all government agencies in a given metro area. As both private industry and government benefit from a metropolitan Wi-Fi, both need to share in its costs as well (Tang, Baker, 2002).

A Technology Capable of Shared Ownership Across Government and Private Industry

The underlying technological foundations of WiMax concentrate on a consortium-based approach to defining specific aggregation, transmission, measurement of performance and optimal usage scenarios for metropolitan-wide Wi-Fi networks (Zhang, Schiffman, Gibbs, Kunjithapatham, Jeong, 2009). In short, the technology platform lends itself…… [Read More]

References

Huang, C., & Chang, J.M. (2008). Responding to security issues in WiMAX networks. It Professional Magazine, 10(5), 15-21.

Dan O'Shea (2006, April). WiMAX Puts Service Quality on Display. Telephony, 247(6), S12-S14.

Peng, Y. (2006). WiMax: The emergence of wireless broadband. It Professional Magazine, 8(4), 44-48.

Tang, D., & Baker, M. (2002). Analysis of a metropolitan-area wireless network. Wireless Networks, 8(2-3), 107-120.
View Full Essay

Wirless Industry the Fact That

Words: 574 Length: 2 Pages Document Type: Essay Paper #: 92315811



This is why the subtitle is interesting on asking whether bidding for the new bandwidth is worth it. On one hand, it is obvious that this is a way of increasing the services that are being offered and, additionally, in amplifying the business. On the other hand, it is interesting to note that any amplification of the business will bring about initial high investment costs, as is notable in Google's case, for example.

It is interesting to note that, while all these entities are battling it out over the extension of the telecommunications spectrum, the entity gaining most out of this is, unlike other cases, the consumer. An extension of the spectrum means everything from new technologies to lower prices, because the competition between the main actors will most likely drive prices down as they try to attract new consumers and retain the existing ones. As such, in an international…… [Read More]

View Full Essay

Data Communication

Words: 1038 Length: 3 Pages Document Type: Essay Paper #: 35781574

Communication -- transmission through wireless and SLIP forms

I've got no strings to hold me down." The Disney version of Pinocchio's enthusiasm for his own wireless status as a 'real boy' is paralleled in the recent enthusiasm of many individual users of the Internet's enthusiasm for 'going wireless.' The delight of personal cable modem and broadband devotee's own 'got no strings' status at their home office spaces has encouraged many corporations to also eschew SLIP modem technology in exchange for the use of wireless technology on a wider scale. Still, fully implementing wireless instrumentation on network scale, no pun intended, has been "an elusive goal for some time," for many industries because of cost and logistical problems. (Drake, 2003) Also, as electronics and data processing technology using SLIP ring data transmissions systems move forward, and industrial instrumentation developers build finer tuned processes, better management information, and greater productivity and performance,…… [Read More]

Works Cited

CCSI. (2003) "Survival kit: SLIP vs. PPP." Retrieved on September 3, 2004 at http://www.ccsi.com/survival-kit/slip-vs.-ppp.html

Drake, Bill. (May 1, 2003) "Blue tooth gets a filling." ISA. Retrieved on September 3, 2004 at http://www.isa.org/InTechTemplate.cfm?Section=Article_Index&template=/ContentManagement/ContentDisplay.cfm&ContentID=25894

Large Slip Ring Assemblies." (2004) Poly-Scientific Website. Retrieved on September 3, 2004 at Polysci. SLIP. Retrieved on September 3, 2004 at http://www.polysci.com/docs/srldsr.pdf

Rockwell Animation. (2003) "Wireless fact v. Fiction." Retrieved on September 3, 2004 at http://www.isa.org/InTechTemplate.cfm?Section=Article_Index&template=/ContentManagement/ContentDisplay.cfm&ContentID=25894
View Full Essay

Standards 802 11 A B G and N

Words: 784 Length: 3 Pages Document Type: Essay Paper #: 42244954

tandards 802.11 "a," "b," "g" and "n" allow different applications to be deployed as mobility services. Based on the readings what might be the steps to setup a wireless network.

teps to establishing a wireless network

The steps to setting up a wireless network are the following:

caling the area

cale the area that you want wireless network set up in so that you can have an initial idea of layout. Meraki's WiFi tumbler is a tool that can help person assess neighboring wireless networks; their channels; names and intensity of strengths in your area. Based on this information, you can design your own access point placement.

Assess how many users will be employing / sharing the network. More than 20 users can make this problematic

Determine the minimum throughput that you would like to have

802.11 a/g offers up to 54 Mbps while 802.11n can attain an approximate 600…… [Read More]

Sources

Badman LH How To Deploy An Open Area With Wireless

Stoneburner, G et al. (2002)Risk management guide for computer security. NIST

TRB (2003) A balanced approach to managing information risk in an unfriendly world.

www.itrb.gov
View Full Essay

Transmission Media Advantaged Disadvantages

Words: 1289 Length: 4 Pages Document Type: Essay Paper #: 21525168

Transmission media, which is also known as communication media, refers to a means with which information is broadcasted from one location to another. The transmission medium in a data transmission system is regarded as the physical pathway between the sender and the receiver of a message or information. Generally, transmission media in computer communications are divided into two categories i.e. bounded and unbounded media. Bounded media are the physical pathways for broadcast information like fiber optic cable while unbounded media is transmission through air like cell phone signals. The bounded media is also known as wired media because it involves physical links while unbounded media is also known as wireless media. Notably, the quality and characteristics of a transmission media is determined by the attributes of the signal and medium.

Wired and Wireless Media:

Wired and wireless media are important means of transmitting or transporting information since they provide different…… [Read More]

Reference:

Dukda, S. (2000, September). Introduction to Structured Cabling. Retrieved from Division of Information Technology -- Ministry of Communication website:  http://www.dit.gov.bt/sites/default/files/cablingstandard.pdf 

Evans, S. (2013, March). Wired v. Wireless in the Enterprise. Retrieved February 9, 2014, from http://www.computerweekly.com/feature/Wired-vs.-wireless-in-the-enterprise

"Wired or Wireless." (n.d.). Virgin Media. Retrieved February 9, 2014, from http://store.virginmedia.com/discover/broadband/your-broadband/connecting/connection-type.html
View Full Essay

Project Management Scenario a Global

Words: 2476 Length: 9 Pages Document Type: Essay Paper #: 9194818

"

There are several benefits that a global consumer electronic firm could derive from inter-project learning.

First, inter-project learning allows firm to enhance project completeness. Prencipe, & Tell (2001) argue that inter-project learning allows firms to execute a project in a best method. In the present competitive market environment, project is the key to the dynamic competitive capabilities. Typically, accumulation of knowledge builds project competencies, which could enhances market performances of a global consumer electronic firm. Experience has revealed that project-based firm has been able to record high profit in the market environment. ( Brady, and Davies, 2004).Through inter-project learning, a global consumer electronic firm will be able to better estimate the project costs and this will enhance ability to deliver the project with success. Moreover, the inter-project learning will enable the company to estimate the project risks efficiently. By better evaluating the project risks, the project manager will be…… [Read More]

References

Anbari, F.T., Carayannis, E.G. And Voetsch, R.J. (2008) Post-project reviews as a key project management competence, Technovation, Vol. 28, pp.633-643.

Brady, T. And Davies, a. (2004) Building of the Project Capabilities: From Exploratory to Exploitative Learning, Organization Studies, Vol.25, No.9, pp.1601-1621.

Prencipe, a. & Tell, F. (2001). Processes and outcomes Inter-project learning: knowledge codification in project-based firms. Research Policy. 30: 1373 -- 1394

Plan:
View Full Essay

Saving Energy in Ad Hoc

Words: 1706 Length: 5 Pages Document Type: Essay Paper #: 22570417

The strategy is to partition the network and distribute the routing of the entire group of node instead of only one node having full energy burden task.

Similar to the previous paper reviewed, Xu et al. (2000) in their paper titled "Adaptive Energy-Conserving Routing for Multihop Ad Hoc Networks" also develop two algorithms for routing energy saving devices. hile other papers develop energy saving devices such as GAF and Span, Xu et al. (2000) develop AODV and DSR, which are the algorithms to reduce energy consumption in the application- level development. Similar to GAF that consume between 40% and 60% of less energy consumption, and Span, AODV and DSR have ability to consume as little as 50% of the energy in the ad-hoc routing protocol, which assist in increasing the network lifetime four-fold.

Keywords

Geographical adaptive fidelity: The energy saving algorithms developed by Xu et al. (2001)

Adaptive Energy Conserving…… [Read More]

Works Cited

Chen, B. Jamieson, K. Balakrishnan, H. "Span: An energy-efficient saving coordination algorithm for topology maintenance in ad hoc wireless networks" ACM Wireless Networks Journal. (2001).

Xu, Y. Heidemann, J. & Estrin, D. Geography-informed Energy Conservation for Ad Hoc Routing. . ACM Wireless Networks Journal. .2001

Xu, Y. Heidemann, J. & Estrin, D. "Adaptive Energy for Routing Conserving for Multihop Ad Hoc Networks." USC/ISI Research Report 527. .2000.
View Full Essay

Access Control Types of Access

Words: 1816 Length: 7 Pages Document Type: Essay Paper #: 33098167

These certificates are issued by the certification authorities (CAs) and they contain the name, expiration dates as well as serial numbers of the certificates.

OS Hardening

Operating system hardening is the process of addressing the various security issues and vulnerabilities in a given operating system via the implementation of the latest Operating system patches, updates, hotfixes as well procedures and policies that are necessary for reducing the number of attacks as well as system downtime.

Application hardening

Application hardening is the process of addressing the various security issues and vulnerabilities in a given operating system via the implementation of the latest application patches, updates, hotfixes as well procedures and policies that are necessary for reducing the number of attacks as well as system downtime.

Transmission / emote access protection protocols

The transmission protocols that are necessary for the information assurance include the used of https as well as FTP. Https…… [Read More]

View Full Essay

Mobile Security

Words: 1535 Length: 6 Pages Document Type: Essay Paper #: 35660798

Mobile Device Security

Analysis of Routing Optimization Security for Mobile IPv6 Networks

Defining and Implementing Mobility Security Architectures

Approaches to defining, implementing and auditing security for mobility devices have become diverse in approach, spanning from protocol definition and development including IPv6 through the creation of secure mobile grid systems. The wide variation in approaches to defining security for mobility devices has also shown the critical need for algorithms and constraint-based technologies that can use constraint-based logic to isolate and thwart threats to the device and the network it is part of. The intent of this analysis is to evaluate the recent developments in constraint-based modeling and network logic as represented by mobile IPv6 protocols and the role trust management networks (Lin, Varadharajan, 2010). These networks are predicated on algorithms that are used authenticating the identity of specific account holders, in addition to defining a taxonomy of the factors that most…… [Read More]

Bibliography

Allen, M. (2006). An IT manager's insight into mobile security. The British Journal of Administrative Management,, 22-23.

Barber, R. (2000). Security in a mobile world - is Bluetooth the answer? Computers & Security, 19(4), 321-325.

Goode, A. (2010). Managing mobile security: How are we doing? Network Security, 2010(2), 12-15.

Komninos, N., Vergados, D., & Douligeris, C. (2006). Layered security design for mobile ad hoc networks. Computers & Security, 25(2), 121-130.
View Full Essay

Security Issues of M Commerce

Words: 5074 Length: 20 Pages Document Type: Essay Paper #: 25740607

wireless Web is truly' the next major wave of Internet computing

A its potential for bringing people together and expanding commerce is even greater than that of the wired Internet."

Edward Kozel, board member and former CTO of Cisco systems (AlterEgo, 2000, p. 12)

The integration of the Internet into our modern culture as a driving force behind business, convenience, services and merchandise acquisition has created a new set of desires for modern consumers. The trend started with the ease and availability of services and products being offer4ed through radio and television advertising, and then infomercials and shopping channels. The internet brought the availability to purchase products, goods, and information from our desks and kitchens. Now trough wireless hotspots and wireless devices, society is following their desires toward a marketing distribution channel which motivates them to pay for internet access, and mobile commerce (m-commerce) anytime, anywhere, and instantly. These sets…… [Read More]

Bibliography

AlterEgo (2000). Building the intelligent internet: Making the case for adaptive network services. [www.alterego.com].

Albright, B. (2000). Mobilize this!. Frontline Solutions, May, 28-32.

Bansal, P. (1.1.2001) Smart cards come of age. The Banker.

Barnett, N., Hodges, S. & Wilshire, M. (2000). M-commerce: An operator's manual. McKinsey Quarterly, 3,162-171.
View Full Essay

Quality Tools

Words: 973 Length: 4 Pages Document Type: Essay Paper #: 4044641

internet connectivity for the last few days. The internet has been going on and off in my home every couple of hours, sporadically. It would work fine during the day, with some hiccups in connection, but then it would be go completely off around 11pm and turn back on around 7 in the morning. I didn't understand why it was happening and decided to generate a flow chart that could help me not only process steps to fixing the problem with the internet but also understand why it could be happening.

My wireless router has had several issues with connectivity recently and is the source for my internet issues. I had concerns over getting a new router, however in developing my flowchart and analyzing for the three days, the times in which the internet went out, I came to the realization the plug connecting the router was loose. What this…… [Read More]

View Full Essay

Security Issues in IEEE Wlan

Words: 6613 Length: 20 Pages Document Type: Essay Paper #: 95819917



Despite its clear benefits and advantages in terms of ease of use and cost effectiveness, there are certain risks associated with wireless networking. These risks are discussed further below.

Review of the Literature.

Security Risks Associated with IEEE WLAN 802.11. The applications for wireless communication technology continue to develop and expand; today, at least, the 802.11b is the standard of choice for wireless router communication used with network installation (Gonazles & Higby 2003). "The integrity of the transmitted data is a valid 2.4 GHz. At this wavelength medium, the propagation of wavelength maintains strong connectivity" (Gonzales & Higby 2003, p. 30). The technology of WLANs actually dates back to the mid-1980s; during this period, the Federal Communications Commission (FCC) freed up radio frequency (rf) to the industry. "Initially, this was viewed as a broadcast reception procedure and very little thought went to broadcast transmission" (Gonzales & Higby 2003, p. 30).…… [Read More]

Bibliography

Alexander, Steve. 2004. Computers and Information Systems. In Encyclopedia Britannica Book of the Year [premium service].

Anderson, Robert H., Tora K. Bikson, Richard O. Hundley & C. Richard Neu. 2003. The Global Course of the Information Revolution: Recurring Themes and Regional Variations. Santa Monica, CA: Rand.

Bliss, R. Marion. September 5, 2003. Homeowners Connect to Wireless Fidelity. The Washington Times, p. F29.

Brookshear, J.G. 2000. Computer Science: An Overview. Reading, Mass: Addison-Wesley.
View Full Essay

Nextel Communications Inc - 2004

Words: 646 Length: 2 Pages Document Type: Essay Paper #: 53032938



The high competition rate in the industry necessitates fast and numerous new developments. Nextel Communications Inc. can much more valuable spend its time and money by investing in new ideas. Court cases take time and energy, while also being highly detrimental to the creative process. In this way, losses are incurred not only in terms of legal fees and work hours, but also in terms of creativity and new products within the company.

In addition, law suits could have a detrimental effect on a company's reputation. If Nextel were for example to lose the case, Verizon receives the right to continue with their product. Potentially, Nextel's reputation could be harmed by its involvement in an apparently petty attempt to corner the market on their product. Even if the company wins, the result could be equally damaging in terms of lost hours as well as creativity and reputation damages.

Furthermore, the…… [Read More]

View Full Essay

Risk Assessment for Cybertrans Ltd

Words: 2782 Length: 10 Pages Document Type: Essay Paper #: 35153313



The diffused infrared configuration however, uses a transmitter that fills a given office space with signals. The signal receiver can then be located anywhere in the office area in order to successfully receive the I signal.

The Spread spectrum LANs

This form of arrangement utilizes the multiple-cell configuration. Each of the cells are appropriately assigned a unique center frequency that lies within a specific band in order to avoid signal interference. This transmission technique makes use of two methods; frequency hopping as well as direct sequence modulation

The Frequency hopping method uses signals that jumps from a given frequency to the other within a specific bandwidth. The transmission unit then "listens" to a give channel and if successfully detects any idle time (a time when no signal is transmitted),then transmits the packet via the full channel bandwidth .In case a channel is deemed "full," the transmitter then "hops" to the…… [Read More]

References

Bruce, WR (2002).Wireless LANs End to End, Ron Gilster (ed.), John Wiley & Sons.

Burell, J (2002) 'Wireless Local Area Networking: Security Assessment and Countermeasures: IEEE 802.11 Wireless Networks', Dec. 2002, retrieved 22 March

2011, <  http://telecom.gmu.edu/sites/default/files/publications/Jim-Burrell-December-2002.pdf >

Cisco (n.d)"Cisco HWIC-AP WLAN Module for Cisco 1800 (Modular), 2800 and 3800."
View Full Essay

Telecom Industry the Total Business

Words: 2045 Length: 5 Pages Document Type: Essay Paper #: 63354661

Wireless although the performance of Cingular has been mediocre also. The new Cingular expects that the added network coverage from at & T. Wireless will assist in opposing that belief nearly from the very beginning. (FCC OKs Cingular, at&T Wireless Merger)

The merger is regarding placing two companies in unison that do not have the metrics to go for the optimum services. Whereas there is scanty reservations regarding the amalgamation gives Cingular instruments to perk up customer satisfaction, the company has to proceed very speedily. Since in excess of 170 million subscribers are at present using a mobile phone in the United States, the phenomenal surge in the recent years is sure of slowing down. Meanwhile, the customers of at & T. Wireless has been deserting at the rate of 3.5% per month during 2004 which is worrying given that rivals Verizon and Nextel Comunications Inc. has been losing their…… [Read More]

References

Cingular, att Wireless merge after clearing last hurdle. October 26, 2004 Retrieved at http://economy.news.designerz.com/cingular-att-wireless-merge-after-clearing-last-hurdle.html. Accessed on 22 November, 2004.

Cingular Completes at&T Wireless Takeover. October 26, 2004. Retrieved at  http://www.consumeraffairs.com/news04/cingular.html . Accessed on 22 November, 2004.

Consumers Will Pay Big for Cingular/at&T Merger, Study Warns. May 27, 2004 Retrieved from ttp:/ / www.consumeraffairs.com/news04/att_merger_phoenix.html. Accessed on 22 November, 2004.

Customer Benefits. 2004. Retrieved at http://www.newcingular.com/c_benefits.html. Accessed on 22 November, 2004.
View Full Essay

Insurance Company Information Technology the

Words: 1256 Length: 4 Pages Document Type: Essay Paper #: 5684755

It is recommended that CoverAll Insurance Company purchase the Cisco WS-C2950-24 for $350 to increase the speed of its existing network. Depending on the number of connections to the Internet, there would need to be one of these Cisco Switches at each inbound Internet location in the company. It is assumed that there is a single Internet connection that CoverAll Insurance Company relies on today. The following table provides the specifications of the Cisco WS-C2950-24.

CISCO WS-C2950-24 SPECIFICATIONS

Product Description

Cisco Catalyst 2950-24 - switch - 24 ports

Device Type

Switch - stackable

Form Factor

External - 1U

Dimensions (WxDxH)

17.5 in x 9.5 in x 1.7 in Weight

6.6 lbs

AM

16 MB SDAM

Flash Memory

MB

Ports Qty

24 x Ethernet 10 Base-T, Ethernet 100 Base-TX

Data Transfer ate

100 Mbps

Data Link Protocol

Ethernet, Fast Ethernet

emote Management Protocol

SNMP, MON, Telnet

Communication Mode

Half-duplex, full-duplex

Features…… [Read More]

References

Borri, M Casoni, ML Merani. "Effectiveness and issues of congestion control in 802.11g wireless LANs. " Wireless Networks 14.2 (2008): 171-182. ABI/INFORM Global. ProQuest. 12 May. 2008

Venkatesh Obanaik, Lillykutty Jacob, AL Ananda. "Secure performance enhancing proxy: To ensure end-to-end security and enhance TCP performance over IPv6 wireless networks. " Computer Networks 50.13 (2006): 2225.

ABI/INFORM Global. ProQuest. 22 May. 2008

Bruce Potter. "Wireless vulnerability assessment. " Network Security 2005.6 (2005): 14-15. ABI/INFORM Global. ProQuest. 20 May. 2008
View Full Essay

Qualcomm in China Why Does

Words: 859 Length: 3 Pages Document Type: Essay Paper #: 95391608

The U.S. government, for example, could back the CDMA technology by promising China that it would support its candidature for the WTO, where eventually China acceded.

3. To what extent do economic factors?

The economic factors are essential in explaining the global leadership of GSM, mainly because of the economies of scale that can be made when dealing with the GSM technology. The economies of scale are evident in terms of the equipment, going as far as the handsets, for example. This means that despite a cost advantage for the CMDA, the economies of scale obtained from the GSM technology can virtually nullify this and make GSM more profitable.

On the Chinese market, economic considerations also played an important role in the competition between GSM and CMDA. First of all, China Unicom had already invested significant sums of money in the development of a wireless network based on GSM, so…… [Read More]

View Full Essay

Cryptography

Words: 4153 Length: 15 Pages Document Type: Essay Paper #: 91116179

In addition electronic purses can be reloaded using ATM machines or traditional tellers (if the card is connected to a banking account).

Additionally, electronic purses are usually based on smart card technology and necessitate a card reader to fulfill a transaction. Equipment including point of sale (POS) terminals, ATMs, and smart card kiosks can be outfitted with card readers (Misra et al., 2004). Every time the user utilizes the card reader to complete a transaction; the card reader will debit or credit the transaction value from or to the card.

The author further asserts that Smart cards can be utilized for various purposes.

In most cases they are used as stored value cards (Misra et al., 2004). Stored value cards can be utilized at the time of purchase and are preloaded with a certain amount of money. These cards can be discarded after they have been used; however, most stored…… [Read More]

References

AL-KAYALI a. (2004) Elliptic Curve Cryptography and Smart Cards GIAC Security Essentials Certification (GSEC). Retrieved October 8 at http://www.sans.org/reading_room/whitepapers/vpns/1378.php

ECC. Retrieved October 8 at http://planetmath.org/encyclopedia/EllipticCurveCryptography.html

Frauenfelder M. (2005) Make: Technology on Your Time. Oreily Misra, S.K., Javalgi, R. (., & Scherer, R.F. (2004). Global Electronic Money and Related Issues. Review of Business, 25(2), 15+.

Mitrou N. (2004) Networking 2004: Networking Technologies, Services, and Protocols. Springer Murphy S., Piper F. (2002) Cryptography: A Very Short Introduction. Oxford University Press: Oxford, England.