Mobile Public Key Infrastructures

Mobile Public Key Infrastructures

I. Chochliouros (Hellenic Telecommunications Organization S.A., Greece), G. Lalopoulos (Hellenic Telecommunications Organization S.A., Greece), S. Chochliouros (Independent Consultant, Greece) and A. Spiliopoulou (Hellenic Telecommunications Organization S.A., Greece)
Copyright: © 2007 |Pages: 8
DOI: 10.4018/978-1-59904-002-8.ch097
OnDemand PDF Download:
No Current Special Offers


From today’s perspective, network and information security (European Commission, 2001) is about ensuring the availability of services and data; preventing the disruption and unauthorized interception of communications; confirming that data sent, received, or stored is complete and unchanged; securing data confidentiality; protecting information systems against unauthorized access; and protecting against attacks (involving malicious software and securing dependable authentication—that is, the confirming of an asserted identity of entities or users). Specific security measures therefore should be taken in order to establish an appropriate environment.

Complete Chapter List

Search this Book: