Supported Authentication Protocols
With mobile devices providing connectivity for data access, secure communication is imperative. Remote access through the device, such as using the Internet, exposes the device to all known forms of attack and interception. To guard against these threats, mobile devices use the following authentication protocols.
See Also
Security for Windows Mobile Devices
Last updated on Friday, April 22, 2005
© 2005 Microsoft Corporation. All rights reserved.
Send feedback on this topic to the authors.