• DocumentCode
    1294427
  • Title

    Hush your mouth! - [comms voice security]

  • Author

    Collins, L.

  • Volume
    4
  • Issue
    11
  • fYear
    2009
  • Firstpage
    70
  • Lastpage
    71
  • Abstract
    Securing corporate information is like squeezing the air in a balloon: the more you tighten your grip on it in one place the more likely it is to escape to another. Now some of the techniques that have been developed to protect mobile data on laptops are being extended to do the same for smartphones, and to start making inroads into what may be the last unprotected source of mobile corporate data- the voice.
  • Keywords
    cryptography; laptop computers; mobile handsets; telecommunication security; laptops; mobile data protection; smartphones; voice encryption;
  • fLanguage
    English
  • Journal_Title
    Engineering & Technology
  • Publisher
    iet
  • ISSN
    1750-9637
  • Type

    jour

  • Filename
    5198454