-
2
-
-
38549089757
-
-
Year over year Wi-Fi chipset sales. Personal Communication, Kelly Davis-Felner October 2006
-
In-Stat: Year over year Wi-Fi chipset sales. Personal Communication, Kelly Davis-Felner (October 2006)
-
-
-
In-Stat1
-
3
-
-
38549156831
-
-
Linsky, J., Bourk, T., Findikli, A., Hulvey, R., Ding, S., Heydon, R., Singer, S., Kingston, S., Wenham, S., Suvak, D., Edlund, M., Chen, P., Aissi, S., Hauser, P., Benaloh, J., Yuval, G., Yacobi, Y., Lafky, J., Simon, D., Roberts, D., Stanwyck, D., Lauter, K., Muchnik, G., Kerai, K., Nyberg, K., Asokan, N., Lobo, N., Ginzboorg, P., Everaere, D., Meindl, R., Bertoni, G., Reuveni, E., Shimojo, Y.: Simple Pairing Whitepaper, revision v10r00 (August 2006), http://www.bluetooth.com/NR/rdonlyres/0A0B3F36-D15F-4470-85A6- F2CCFA26F70F/0/SimplePairing_WP_V10r00.pdf
-
Linsky, J., Bourk, T., Findikli, A., Hulvey, R., Ding, S., Heydon, R., Singer, S., Kingston, S., Wenham, S., Suvak, D., Edlund, M., Chen, P., Aissi, S., Hauser, P., Benaloh, J., Yuval, G., Yacobi, Y., Lafky, J., Simon, D., Roberts, D., Stanwyck, D., Lauter, K., Muchnik, G., Kerai, K., Nyberg, K., Asokan, N., Lobo, N., Ginzboorg, P., Everaere, D., Meindl, R., Bertoni, G., Reuveni, E., Shimojo, Y.: Simple Pairing Whitepaper, revision v10r00 (August 2006), http://www.bluetooth.com/NR/rdonlyres/0A0B3F36-D15F-4470-85A6- F2CCFA26F70F/0/SimplePairing_WP_V10r00.pdf
-
-
-
-
4
-
-
38549094317
-
-
Lortz, V., Roberts, D., Erdmann, B., Dawidowsky, F., Hayes, K., Yee, J.C., Ishidoshiro, T.: Wi-Fi Simple Config Specification, version 1.0a (February 2006)
-
Lortz, V., Roberts, D., Erdmann, B., Dawidowsky, F., Hayes, K., Yee, J.C., Ishidoshiro, T.: Wi-Fi Simple Config Specification, version 1.0a (February 2006)
-
-
-
-
5
-
-
38549096803
-
-
Revised, May
-
Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: National Institute of Standards and Technology (NIST) Special Publication 800-57 (Draft): Recommendation for Key Management - Part 1 General (Revised) (May 2006)
-
(2006)
National Institute of Standards and Technology (NIST) Special Publication 800-57 (Draft): Recommendation for Key Management - Part 1 General
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
6
-
-
33751044073
-
Talking to Strangers: Authentication in ad-hoc wireless networks
-
San Diego, CA, Internet Society February
-
Balfanz, D., Smetters, D., Stewart, P., Wong, H.C.: Talking to Strangers: Authentication in ad-hoc wireless networks. In: NDSS 2002. Proceedings of the Symposium on Network and Distributed Systems Security, San Diego, CA, Internet Society (February 2002)
-
(2002)
NDSS 2002. Proceedings of the Symposium on Network and Distributed Systems Security
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.C.4
-
8
-
-
80053009170
-
IEEE 802.15.1-2005 - IEEE Standard for Information Technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific Requirements
-
IEEE
-
IEEE: IEEE 802.15.1-2005 - IEEE Standard for Information Technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific Requirements. Part 15.1: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Networks (WPANs(tm)) (2005)
-
(2005)
Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Networks (WPANs(tm))
, Issue.PART 15.1
-
-
-
9
-
-
84863901332
-
IEEE 802.11-1999 - IEEE Standard for Information Technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific Requirements
-
IEEE
-
IEEE: IEEE 802.11-1999 - IEEE Standard for Information Technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific Requirements. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications (2003)
-
(2003)
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications
, Issue.PART 11
-
-
-
10
-
-
38549157285
-
IEEE 802.11-1999 - IEEE Standard for Information Technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific Requirements
-
IEEE:, Medium Access Control Security Enhancements
-
IEEE: IEEE 802.11-1999 - IEEE Standard for Information Technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific Requirements. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications - Amendment 6: Medium Access Control Security Enhancements (2004)
-
(2004)
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications - Amendment
, vol.6
, Issue.PART 11
-
-
-
11
-
-
38549125193
-
-
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: RFC 3748: Extensible Authentication Protocol (June 2004)
-
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: RFC 3748: Extensible Authentication Protocol (June 2004)
-
-
-
-
12
-
-
38149097247
-
Security associations in personal networks: A comparative analysis
-
Technical report, Nokia Research Center, Technical Report NRC-TR-2007-004
-
Suomalainen, J., Valkonen, J., Asokan, N.: Security associations in personal networks: A comparative analysis. Technical report, Nokia Research Center, Technical Report NRC-TR-2007-004 (2007)
-
(2007)
-
-
Suomalainen, J.1
Valkonen, J.2
Asokan, N.3
-
14
-
-
38549114783
-
-
Nyberg, K.: Connect Now to MitM. In: Presentation at Crypto 2006 Rump Session (August 2006)
-
Nyberg, K.: Connect Now to MitM. In: Presentation at Crypto 2006 Rump Session (August 2006)
-
-
-
-
15
-
-
84935078039
-
-
Jakobsson, M., Wetzel, S.: Security weaknesses in Bluetooth. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, 2020, pp. 176-191. Springer, Heidelberg (2001)
-
Jakobsson, M., Wetzel, S.: Security weaknesses in Bluetooth. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 176-191. Springer, Heidelberg (2001)
-
-
-
-
17
-
-
77953838402
-
Cracking the Bluetooth PIN
-
June
-
Shaked, Y., Wool, A.: Cracking the Bluetooth PIN. In: MobiSys. The Third International Conference on Mobile Systems, Applications, and Services, pp. 39-50 (June 2005)
-
(2005)
MobiSys. The Third International Conference on Mobile Systems, Applications, and Services
, pp. 39-50
-
-
Shaked, Y.1
Wool, A.2
-
18
-
-
38549108892
-
Usability analysis of secure pairing methods
-
Dietrich, S, Dhamija, R, eds, FC 2007 and USEC 2007, Springer, Heidelberg
-
Uzun, E., Karvonen, K., Asokan, N.: Usability analysis of secure pairing methods. In: Dietrich, S., Dhamija, R., (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 307-324. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4886
, pp. 307-324
-
-
Uzun, E.1
Karvonen, K.2
Asokan, N.3
-
19
-
-
38549146619
-
-
Newman, R., Gavette, S., Yonge, L., Anderson, R.: Protecting domestic power-line communications. In: SOUPS. Symposium On Usable Privacy and Security (July 2006)
-
Newman, R., Gavette, S., Yonge, L., Anderson, R.: Protecting domestic power-line communications. In: SOUPS. Symposium On Usable Privacy and Security (July 2006)
-
-
-
-
20
-
-
84947251443
-
The Resurrecting Duckling: Security issues for ad-hoc wireless networks
-
Malcolm, J.A, Christianson, B, Crispo, B, Roe, M, eds, Security Protocols, Springer, Heidelberg
-
Stajano, F., Anderson, R.: The Resurrecting Duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols. LNCS, vol. 1796, pp. 172-194. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1796
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
21
-
-
85084163516
-
-
Balfanz, D., Durfee, G., Grinter, R.E., Smetters, D.K., Stewart, P.: Network-in-a-Box: How to set up a secure wireless network in under a minute. In: USENIX. Proceedings of the 13th USENIX Security Symposium (August 2004)
-
Balfanz, D., Durfee, G., Grinter, R.E., Smetters, D.K., Stewart, P.: Network-in-a-Box: How to set up a secure wireless network in under a minute. In: USENIX. Proceedings of the 13th USENIX Security Symposium (August 2004)
-
-
-
|