메뉴 건너뛰기




Volumn 46, Issue 9, 2003, Pages 74-79

Security and privacy issues of handheld and wearable wireless devices

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CELLULAR TELEPHONE SYSTEMS; COMPUTER HARDWARE; GLOBAL POSITIONING SYSTEM; INTEROPERABILITY; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; PERSONAL DIGITAL ASSISTANTS; RANDOM ACCESS STORAGE; TELECOMMUNICATION TRAFFIC; WORLD WIDE WEB;

EID: 4243098281     PISSN: 00010782     EISSN: None     Source Type: Journal    
DOI: 10.1145/903893.903897     Document Type: Review
Times cited : (52)

References (12)
  • 1
    • 0034777649 scopus 로고    scopus 로고
    • Intercepting mobile communications: The insecurity of 802.11
    • Borisov, N. et al. Intercepting mobile communications: The insecurity of 802.11. In Proceeding? of ACM/IEEE MOBICOM 2001; 180-189.
    • Proceeding? of ACM/IEEE MOBICOM 2001 , pp. 180-189
    • Borisov, N.1
  • 2
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security
    • Sept.
    • Carman, D.W. et al. Constraints and approaches for distributed sensor network security. NAI Labs Technical Report. (Sept. 2000); www.nai.com/research/ nailabs/cryptographic/a-communications-security.asp
    • (2000) NAI Labs Technical Report
    • Carman, D.W.1
  • 5
    • 12444324513 scopus 로고    scopus 로고
    • Providing secrecy in key management protocols for large wireless sensor networks
    • To appear
    • Di Pietro, R. et al. Providing secrecy in key management protocols for large wireless sensor networks. J. Adhoc Networks. To appear.
    • J. Adhoc Networks
    • Di Pietro, R.1
  • 6
    • 0030415891 scopus 로고    scopus 로고
    • Security on the move: Indirect authentication using Kerberos
    • Fox, A. and Gribble, S. Security on the move: Indirect authentication using Kerberos. In Proceedings of ACM/IEEE MOBICOM 1996; 155-164.
    • Proceedings of ACM/IEEE MOBICOM 1996 , pp. 155-164
    • Fox, A.1    Gribble, S.2
  • 7
    • 0033282985 scopus 로고    scopus 로고
    • Preventing traffic analysis for real-time communication networks
    • Nov.
    • Guan, Y. et al. Preventing traffic analysis for real-time communication networks. In Proceedings of IEEE Milcom (Nov. 1999), 744-750.
    • (1999) Proceedings of IEEE Milcom , pp. 744-750
    • Guan, Y.1
  • 9
    • 0035282175 scopus 로고    scopus 로고
    • DEAPspace - Transient ad hoc networking of pervasive devices
    • Hermann, R. et al. DEAPspace - Transient ad hoc networking of pervasive devices. Computer Networks 35 (2001), 411-428.
    • (2001) Computer Networks , vol.35 , pp. 411-428
    • Hermann, R.1
  • 10
    • 6444245093 scopus 로고    scopus 로고
    • People, places, things: Web presence for the real world
    • Oct. Kluwer A.P.
    • Kindberg, T. et al. People, places, things: Web presence for the real world. MONET 7, 5 (Oct. 2002), Kluwer A.P., 365-376.
    • (2002) MONET , vol.7 , Issue.5 , pp. 365-376
    • Kindberg, T.1
  • 11
    • 0041386047 scopus 로고    scopus 로고
    • Using handhelds and PCs together
    • Nov.
    • Myers, B.A. Using handhelds and PCs together. Commun. ACM 44, 11 (Nov. 2001), 34-41.
    • (2001) Commun. ACM , vol.44 , Issue.11 , pp. 34-41
    • Myers, B.A.1
  • 12
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • May
    • Sandhu, R. et al. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Info. and System Security 3, 2 (May 2000) 85-106.
    • (2000) ACM Trans. Info. and System Security , vol.3 , Issue.2 , pp. 85-106
    • Sandhu, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.