Arts
Business
Computers
Games
Health
Home
Kids and Teens
News
Recreation
Reference
Regional
Science
Shopping
Society
Sports

   Home / Computers / Mobile Computing / Wireless Data / WAP / Security
 
   Web Sites
  • Attacks against the WAP WTLS Protocol - Article by Markku-Juhani Saarinen.
    www.jyu.fi/~mjos/wtls.pdf
  • Cayman Systems - A Mobile Wireless LAN Security company.
    www.caymansys.com/security.htm
  • Columbitech Security White Papers - White papers about WAP security and the WTLS protocol.
    www.columbitech.com/Products/whitepapers.shtm
  • Diversinet - Passport Certificate Server Security software for wireless e-commerce applications.
    www.diversinet.com
  • Freecerts - Free WAP certificates for test purposes. The service is based on software developed by the OpenSSL Project.
    www.freecerts.com
  • iD2 - PKI, public key infrastructure, smart cards.
    www.smarttrust.com
  • mi4e - Develops mobile internet for ecommerce infrastructure software.
    www.mi4e.com
  • NTRU Cryptosystems - Delivers public key cryptography solutions to secure electronic media and wireless communications and content on mobile devices such as the Palm Pilot, or in any constrained environment.
    www.ntru.com
  • SmartTrust - Secure transactions and exchange of information via the mobile phone with PKI security.
    www.sonera.fi/smarttrust
  • Sperrin Networks - Sperrin Networks security offerings provide customers with the flexibility to create and implement an easy-to-use, yet uniquely tailored set of security policies, regardless of dedicated access speeds, network size, or types of Internet applications.
    www.sperrinnetworks.com
  • W/SECURE SDK - A powerful SDK for creation of secure encrypted sessions between on-line applications.
    www.baltimore.com/products/wsecure/index.html
  • WAP Security Solutions from HP - HP's security solutions for Wireless Application Protocol (WAP) services on mobile phones and wireless devices.
    www.hp.com/security/solutions/wap
  • WTLS - An Introduction to WAP Security at the Network Protocol Layer by Philip Mikal
    mikal.org/interests/articles/article0003.jsp

Google
1995-2015 © Stunning, Inc.