Skip to main content

Wave goodbye to cyber security concerns

Visitor to Wave Mobile Solutions’ booth can see the latest authentication, encryption and verification system based on the Elliptic Curve Integrated Scheme. Produced by Virgil Security and integrated into Wave’s solutions, the system uses standardsbased cryptography with an open, global key management system to enhance security while protecting privacy. Virgil’s encryption libraries and services, along with the accompanying public key management infrastructure, are said to work seamlessly in the backgrou
June 13, 2016 Read time: 1 min
Visitor to 8436 Wave Mobile Solutions’ booth can see the latest authentication, encryption and verification system based on the Elliptic Curve Integrated Scheme. Produced by Virgil Security and integrated into Wave’s solutions, the system uses standardsbased cryptography with an open, global key management system to enhance security while protecting privacy.

Virgil’s encryption libraries and services, along with the accompanying public key management infrastructure, are said to work seamlessly in the background and be easy to implement.

For more information on companies in this article

Related Content

  • European ITS Congress emphasises ITS development and deployment
    February 6, 2012
    The 8th European ITS Congress is a key event for the industry. Hermann Meyer, CEO of Ertico-ITS Europe puts the event in context
  • Cooperative systems and privacy not mutually exclusive
    February 1, 2012
    Are co-operative systems and personal privacy mutually exclusive? Not necessarily, says Neil Hoose. But the more advanced the application, the greater the concession of privacy may have to become. ITS Stockholm in 2009 and the Cooperative Mobility Showcase event which took place alongside Intertraffic in Amsterdam in March this year both featured live, on-street demonstrations of safety and driver information applications that used Vehicle-to-Infrastructure (V2I) and Vehicle-to-Vehicle (V2V) communications,
  • Cooperative systems and privacy not mutually exclusive
    February 6, 2012
    Are co-operative systems and personal privacy mutually exclusive? Not necessarily, says Neil Hoose. But the more advanced the application, the greater the concession of privacy may have to become
  • Hackathon success at ITS World Congress
    October 10, 2016
    As the 2016 ITS World Congress was opening its doors, hacking trio Hong Yew, Ram Kanagaratnam and Kyle Mantesso of team Geolicious were collecting the AU$10,000 first prize in the ITS 2016 Mastercard Smart Cities Hackathon. the first ITS Smart City Hack was designed to encourage collaboration and innovative thinking and was the largest event of its kind in Australia. Total prize money of AU$20,000 enticed 16 teams of Australia’s most talented developers, designers and entrepreneurs to enter the two-day e