Across
- 2. WTLS provides this to verify the identity of the communicating parties
- 4. The layer in WAP responsible for managing session states
- 6. The layer in WAP responsible for security
- 7. WTLS provides this to ensure data is private
- 8. The protocol used in the Security Layer of WAP
- 10. WTLS is optimized for this type of bandwidth
Down
- 1. WTLS is designed to work efficiently in this type of delay network
- 3. WTLS is based on this protocol
- 5. WTLS provides this to ensure data has not been tampered with
- 9. WTLS is based on this protocol
