Skip to main content

Wave goodbye to cyber security concerns

Visitor to Wave Mobile Solutions’ booth can see the latest authentication, encryption and verification system based on the Elliptic Curve Integrated Scheme. Produced by Virgil Security and integrated into Wave’s solutions, the system uses standardsbased cryptography with an open, global key management system to enhance security while protecting privacy. Virgil’s encryption libraries and services, along with the accompanying public key management infrastructure, are said to work seamlessly in the backgrou
June 13, 2016 Read time: 1 min
Visitor to 8436 Wave Mobile Solutions’ booth can see the latest authentication, encryption and verification system based on the Elliptic Curve Integrated Scheme. Produced by Virgil Security and integrated into Wave’s solutions, the system uses standardsbased cryptography with an open, global key management system to enhance security while protecting privacy.

Virgil’s encryption libraries and services, along with the accompanying public key management infrastructure, are said to work seamlessly in the background and be easy to implement.

For more information on companies in this article

Related Content

  • Huawei's ORT tech removes highway toll gates
    August 26, 2020
    Road tolling operations will be transformed by new revenue collection possibilities
  • World Congress rewards outstanding ITS
    September 9, 2014
    Tradition dictates that the ITS World Congress is the setting for a variety of award presentations, and 2014 is no exception. During the glittering 2014 ITS World Congress opening ceremony the first of a series of awards was presented with São Paulo’s Municipal Department of Transport receiving the MobiPrize Enterprising City/State Award.
  • Virtual ITS European Congress 2020: report
    November 25, 2020
    ITS industry ‘needs to make a move towards each other’, Congress delegates hear
  • Lowering the barriers to combined control rooms
    March 29, 2017
    Integrating control rooms can improve traffic management, security and emergency response without excessive cost or compromising privacy. In the wake of the recent terrorist events in France and Germany where the transport system was exploited with deadly consequences, many governments and agencies are reviewing the security arrangements – particularly around popular and high profile events. Increasing security in transport systems that must remain accessible to the general public will not be easy but in ma