DocumentCode
1294427
Title
Hush your mouth! - [comms voice security]
Author
Collins, L.
Volume
4
Issue
11
fYear
2009
Firstpage
70
Lastpage
71
Abstract
Securing corporate information is like squeezing the air in a balloon: the more you tighten your grip on it in one place the more likely it is to escape to another. Now some of the techniques that have been developed to protect mobile data on laptops are being extended to do the same for smartphones, and to start making inroads into what may be the last unprotected source of mobile corporate data- the voice.
Keywords
cryptography; laptop computers; mobile handsets; telecommunication security; laptops; mobile data protection; smartphones; voice encryption;
fLanguage
English
Journal_Title
Engineering & Technology
Publisher
iet
ISSN
1750-9637
Type
jour
Filename
5198454
Link To Document