Table of Contents
Encryption for Wireless Communications (Technical Insights), Executive SummaryOverviewIntroductionTechnology DescriptionNeed for EncryptionScope and MethodologyScopeMethodologyEncryption for Wireless Communications (Technical Insights), Technological OverviewWireless Local Area Network (WLAN)BackgroundOperationStandardsWireless Fidelity (WiFi)OverviewRange and PerformanceWiFi EncryptionWorldwide Interoperability for Microwave Access (WiMAX)Technology OverviewStandards and SpecificationsWiMAX EncryptionCellular and RFIDCode Division Multiple Access (CDMA)Global System for Mobile Communications (GSM)RFID TechnologyEncryption for Wireless Communications (Technical Insights), Technology Applications and Impact AnalysisApplication AnalysisEncryption for Wireless CommunicationsVirtual Private NetworksXML EncryptionXML and CryptographyPDA EncryptionWPA and Wired Equivalent PrivacyWiFi and VPNVoice over WLANTechnology Roadmap and Ranking AnalysisTechnology RoadmapAnalysis and Ranking of Encryption in Wireless TechnologiesEncryption for Wireless Communications (Technical Insights), Technology Adoption Factor AnalysisDrivers and ChallengesDriversChallengesBenefits and ThreatsBenefitsThreatsEncryption for Wireless Communications (Technical Insights), Assessment of OpportunitiesAdvancements in Companies/OrganisationsEncryption Aids in IP SecurityPico Chip with Counter Mode EncryptionEncrypted Smart Card Readers for Wireless CommunicationEncryption Solutions for Wireless ATMsDatacryptor Aids in Network Security through EncryptionProgrammable Encryption for Wireless NetworksSecuring Wireless AccessDES Encryption Helps to Protect Voice and DataSecurity Processors Come Embedded in a ChipSecureGSM Addresses SecurityDevelopments in Universities and Research InstitutesEncryption for Secure Military ApplicationsWireless Developments in Emergency ResponseEncryption and Power Consumption in Wireless NetworksResearchers Crack Security Hole in RFIDWireless Security through Encryption in AntennasEncryption in Reconfiguration of Camera through InternetSchedulers to Support Wireless LANSymmetrical Key Encryption Algorithms Addresses SecurityDevelopments in 3G/4G domainEncryption Workshops for Realization of AESEncryption for Wireless Communications (Technical Insights), Patents and Contact DetailsPatents2005 Patents2004/2003 PatentsContact DetailsCompany ContactsUniversity ContactsEncryption for Wireless Communications (Technical Insights), Frost & Sullivan 2005 Science and Technology AwardsExcellence in TechnologyAward DescriptionAward RecipientExcellence in ResearchAward DescriptionAward RecipientTechnology InnovationAward DescriptionAward RecipientEncryption for Wireless Communications (Technical Insights), Critical Reference TablesDecision Support Database TablesSecure Servers (1999 to 2009)Wireless Revenue (1999 to 2009)Mobile Communication Revenue (1999 to 2006)Mobile Penetration (1999 to 2006)Mobile Subscribers (1999 to 2006)US Mobile Subscribers and Penetration (1999 to 2009)Number of Wireless Subscribers (1999 to 2009)