DocumentCode :
1294427
Title :
Hush your mouth! - [comms voice security]
Author :
Collins, L.
Volume :
4
Issue :
11
fYear :
2009
Firstpage :
70
Lastpage :
71
Abstract :
Securing corporate information is like squeezing the air in a balloon: the more you tighten your grip on it in one place the more likely it is to escape to another. Now some of the techniques that have been developed to protect mobile data on laptops are being extended to do the same for smartphones, and to start making inroads into what may be the last unprotected source of mobile corporate data- the voice.
Keywords :
cryptography; laptop computers; mobile handsets; telecommunication security; laptops; mobile data protection; smartphones; voice encryption;
fLanguage :
English
Journal_Title :
Engineering & Technology
Publisher :
iet
ISSN :
1750-9637
Type :
jour
Filename :
5198454
Link To Document :
بازگشت