-
1
-
-
84893804955
-
-
MeT PTD definition (version 1.1). /), Feb
-
MeT PTD definition (version 1.1). Mobile Electronic Transactions Ltd(http://www.mobiletransaction.org/), Feb. 2001
-
(2001)
Mobile Electronic Transactions Ltd
-
-
-
4
-
-
0003775073
-
-
U. S. Department of Commerce
-
U. S. Department of Commerce, The Emerging Digital Economy II. http://www.esa.doc.gov/508/esa/TheEmergingDigitalEconomyII.htm, 1999
-
(1999)
The Emerging Digital Economy II.
-
-
-
5
-
-
0004060599
-
-
World Wide Web Consortium
-
World Wide Web Consortium, The World Wide Web Security FAQ. http://www.w3.org/Security/faq/www-security-faq.html, 1998
-
(1998)
The World Wide Web Security FAQ
-
-
-
8
-
-
0035395659
-
Facing the challenges of wireless security
-
July
-
S. K. Miller, Facing the Challenges of Wireless Security, IEEE Computer, vol. 34, pp. 46-48, July 2001
-
(2001)
IEEE Computer
, vol.34
, pp. 46-48
-
-
Miller, S.K.1
-
9
-
-
84949228968
-
Wired versus wireless ecurity-The internet, wap and imode for e-commerce
-
Dec
-
P. Ashley, H. Hinton, and M. Vandenwauver, Wired versus wireless ecurity-The Internet, WAP and iMode for e-commerce, in Proc. 17th Annual Computer Security Applications Conf., Dec. 2001
-
(2001)
Proc. 17th Annual Computer Security Applications Conf
-
-
Ashley, P.1
Hinton, H.2
Vandenwauver, M.3
-
12
-
-
0036957308
-
Securing wireless data: System architecture challenges
-
Syn thesis October
-
S. Ravi, A. Raghunathan, and N. Potlapally, Securing wireless data: System architecture challenges, in Proc. Intl. Symp. System Synthesis, pp. 195-200, October 2002
-
(2002)
Proc. Intl. Symp. System
, pp. 195-200
-
-
Ravi, S.1
Raghunathan, A.2
Potlapally, N.3
-
13
-
-
84956860375
-
Experimenting with electronic commerce on the palmpilot
-
Feb
-
D. Boneh and N. Daswani, Experimenting with electronic commerce on the PalmPilot, in Proc. Financial Cryptography, pp. 1-16, Feb. 1999
-
(1999)
Proc. Financial Cryptography
, pp. 1-16
-
-
Boneh, D.1
Daswani, N.2
-
17
-
-
84892647098
-
-
IEEE 802.11 Wireless LAN Standards
-
IEEE 802.11 Wireless LAN Standards. IEEE 802.11 Working Group (http://grouper.ieee.org/groups/802/11/
-
IEEE 802.11 Working Group
-
-
-
18
-
-
84893803192
-
-
Bluetooth security white paper., Apr
-
Bluetooth security white paper. Bluetooth SIG Security Expert Group (http://www.bluetooth.com/), Apr. 2002
-
(2002)
Bluetooth SIG Security Expert Group
-
-
-
19
-
-
0029360131
-
Security issues in a cdpd wireless network
-
August
-
Y. Frankel, A. Herzberg, P. A. Karger, H. Krawczyk, C. A. Kunzinger, and M. Yung, Security issues in a CDPD wireless network, IEEE Personal Communications, vol. 2, pp. 16-27, August 1995
-
(1995)
IEEE Personal Communications
, vol.2
, pp. 16-27
-
-
Frankel, Y.1
Herzberg, A.2
Karger, P.A.3
Krawczyk, H.4
Kunzinger, C.A.5
Yung, M.6
-
20
-
-
0031170116
-
Weaknesses of north american wireless authentication protocol
-
june
-
S. Patel, Weaknesses of North American wireless authentication protocol, IEEE Personal Communications, vol. 4, pp. 40-44, june 1997
-
(1997)
IEEE Personal Communications
, vol.4
, pp. 40-44
-
-
Patel, S.1
-
21
-
-
0002917345
-
Unsafe at any key size: An analysis of the wep encapsulation
-
Oct
-
J. R. Walker, Unsafe at any key size: An analysis of the WEP encapsulation. IEEE document 802.11-00/362 (http://grouper.ieee.org/groups/802/ 11/Documents/), Oct. 2000
-
(2000)
IEEE Document 802.11-00/362
-
-
Walker, J.R.1
-
22
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
July
-
N. Borisov, I. Goldberg, and D. Wagner, Intercepting mobile communications: The insecurity of 802.11, in Proc. ACM Int. Conf. Mobile Computing and Networking, pp. 180-189, July 2001
-
(2001)
Proc. ACM Int. Conf. Mobile Computing and Networking
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
23
-
-
0003063931
-
An inductive chosen plaintext attack against wep/wep2
-
May
-
W. A. Arbaugh, An inductive chosen plaintext attack against WEP/WEP2. IEEE document 802.11-01/230-(http://grouper.ieee.org/groups/802/11/Documents/), May 2001
-
(2001)
IEEE Document 802.11-01/230
-
-
Arbaugh, W.A.1
-
24
-
-
0032124041
-
Mobility and security management in the GSM system and some proposed future improvements
-
July
-
A. Mehrotra and L. S. Golding, Mobility and security management in the GSM system and some proposed future improvements, Proceedings of the IEEE, vol. 86, pp. 1480-1497, July 1998
-
(1998)
Proceedings of the IEEE
, vol.86
, pp. 1480-1497
-
-
Mehrotra, A.1
Golding, L.S.2
-
27
-
-
0035386873
-
Wireless security
-
July
-
C. W. Blanchard, Wireless security, BT Technology Journal (http://www.bt.com/bttj/), vol. 19, pp. 67-75, July 2001
-
(2001)
BT Technology Journal
, vol.19
, pp. 67-75
-
-
Blanchard, C.W.1
-
30
-
-
84893772847
-
-
IPSec Working Group. http://www.ietf.org/html.charters/ipsec-charter.html
-
IPSec Working Group
-
-
-
31
-
-
84893792736
-
-
TLS Working Group. http://www.ietf.org/html.charters/tls-charter.html
-
TLS Working Group
-
-
-
36
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
NAI Labs, Network Associates, Inc., Glenwood MD Sept
-
D. W. Carman, P. S. Krus, and B. J. Matt, Constraints and approaches for distributed sensor network security, Tech. Rep. #00-010, NAI Labs, Network Associates, Inc., Glenwood, MD, Sept. 2000
-
(2000)
Tech. Rep. #00-010
-
-
Carman, D.W.1
Krus, P.S.2
Matt, B.J.3
-
37
-
-
84962267980
-
Battery-driven system design: A new frontier in low power design
-
Jan
-
K. Lahiri, A. Raghunathan, and S. Dey, Battery-driven system design: A new frontier in low power design, in Proc. Joint Asia and South Pacific Design Automation Conf. / Int. Conf. VLSI Design, pp. 261-267, Jan. 2002
-
(2002)
Proc. Joint Asia and South Pacific Design Automation Conf. Int. Conf. VLSI Design
, pp. 261-267
-
-
Lahiri, K.1
Raghunathan, A.2
Dey, S.3
-
42
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
D. Boneh, R. DeMillo, and R. Lipton, On the importance of checking cryptographic protocols for faults, Springer-Verlag Lecture Notes in Computer Science (Proceedings of Eurocrypt?97), vol. 1233, pp. 37-51, 1997
-
(1997)
Springer-Verlag Lecture Notes in Computer Science (Proceedings of Eurocrypt?97
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.2
Lipton, R.3
-
43
-
-
84958641478
-
Differential fault analysis of secret key cryptosystems
-
E. Biham and A. Shamir, Differential fault analysis of secret key cryptosystems, Lecture Notes in Computer Science, vol. 1294, pp. 513-525, 1997
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
44
-
-
84939573910
-
-
P. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, Springer-Verlag Lecture Notes in Computer Science, vol. 1666, pp. 388-397, 1999
-
(1999)
Differential Power Analysis Springer-Verlag Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
46
-
-
0022218742
-
Electromagnetic radiation from video display units: An eavesdropping risk?
-
W. Van Eck, Electromagnetic radiation from video display units: An eavesdropping risk?, Computers and Security, vol. 4, no. 4, pp. 269-286, 1985
-
(1985)
Computers and Security
, vol.4
, Issue.4
, pp. 269-286
-
-
Van Eck, W.1
-
47
-
-
84943632039
-
-
Springer-Verlag Lecture Notes in Computer Science
-
P. C. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Springer-Verlag Lecture Notes in Computer Science, vol. 1109, pp. 104-113, 1996
-
(1996)
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
48
-
-
0030107358
-
Network security under siege: The timing attack
-
March
-
E. English and S. Hamilton, Network security under siege: The timing attack, IEEE Computer, vol. 29, pp. 95-97, March 1996
-
(1996)
IEEE Computer
, vol.29
, pp. 95-97
-
-
English, E.1
Hamilton, S.2
-
49
-
-
84955621400
-
-
Information Hiding Springer Lecture Notes in Computer Science
-
D. Aucsmith, Tamper Resistant Software: An Implementation, Information Hiding, Springer Lecture Notes in Computer Science, vol. 1174, pp. 317-333, 1986
-
(1986)
Tamper Resistant Software: An Implementation
, vol.1174
, pp. 317-333
-
-
Aucsmith, D.1
-
51
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation-Tools for software protection
-
August
-
C. S. Collberg and C. Thomborson, Watermarking, tamper-proofing, and obfuscation-Tools for software protection, IEEE Transactions on Software Engineering, vol. 28, pp. 735-746, August 2002
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, pp. 735-746
-
-
Collberg, C.S.1
Thomborson, C.2
-
52
-
-
0012583179
-
-
Texas Instruments Inc
-
OMAP Platform-Overview. Texas Instruments Inc. (http://www.ti.com/sc/omap
-
OMAP Platform-Overview
-
-
-
53
-
-
0002449750
-
Subword parallelism with max-2
-
Aug
-
R. B. Lee, Subword Parallelism with Max-2, IEEE Micro, vol. 16, pp. 51-59, Aug. 1996
-
(1996)
IEEE Micro
, vol.16
, pp. 51-59
-
-
Lee, R.B.1
-
55
-
-
0035517885
-
Efficient permutations for fast software cryptography
-
Dec
-
R. B. Lee, Z. Shi, and X. Yang, Efficient Permutations for Fast Software Cryptography, IEEE Micro, vol. 21, pp. 56-69, Dec. 2001
-
(2001)
IEEE Micro
, vol.21
, pp. 56-69
-
-
Lee, R.B.1
Shi, Z.2
Yang, X.3
-
56
-
-
0034444066
-
Architectural support for fast symmetric-key cryptography
-
Nov
-
J. Burke, J. McDonald, and T. Austin, Architectural Support for Fast Symmetric-Key Cryptography, in Proc. Intl. Conf. ASPLOS, pp. 178-189, Nov. 2000
-
(2000)
Proc. Intl. Conf. ASPLOS
, pp. 178-189
-
-
Burke, J.1
McDonald, J.2
Austin, T.3
-
57
-
-
84893727726
-
-
SmartMIPS. http://www.mips.com
-
SmartMIPS
-
-
-
59
-
-
84893733465
-
-
Discretix Technologies Ltd
-
CryptocellTM. Discretix Technologies Ltd. (http://www.discretix.com
-
CryptocellTM
-
-
-
60
-
-
84893768971
-
-
Safenet Inc
-
Safenet EmbeddedIPTM. Safenet Inc. (http://www.safenet-inc.com
-
Safenet EmbeddedIPTM
-
-
-
61
-
-
67650516006
-
-
SLE 88 family
-
SLE 88 family. Infineon Technologies (http://www.infineon.com
-
Infineon Technologies
-
-
-
63
-
-
84893717539
-
-
Mobey Forum. http://www.mobeyforum.org/.
-
Mobey Forum
-
-
-
64
-
-
84893717823
-
-
Mobile Payment. http://www.mobilepaymentforum.org/.
-
Mobile Payment
-
-
-
66
-
-
0036055207
-
System design methodologies for a wireless security processing platform
-
June
-
S. Ravi, A. Raghunathan, N. Potlapally, and M. Sankaradass, System Design Methodologies for a Wireless Security Processing Platform, in Proc. ACM/IEEE Design Automation Conf., pp. 777-782, June 2002
-
(2002)
Proc. ACM/ IEEE Design Automation Conf
, pp. 777-782
-
-
Ravi, S.1
Raghunathan, A.2
Potlapally, N.3
Sankaradass, M.4
-
67
-
-
0036285946
-
Optimizing public-key encryption for wireless clients
-
May
-
N. Potlapally, S. Ravi, A. Raghunathan, and G. Lakshminarayana, Optimizing Public-Key Encryption for Wireless Clients, in Proc. IEEE Int. Conf. Communications, pp. 1050-1056, May 2002
-
(2002)
Proc. IEEE Int. Conf. Communications
, pp. 1050-1056
-
-
Potlapally, N.1
Ravi, S.2
Raghunathan, A.3
Lakshminarayana, G.4
-
68
-
-
0002284795
-
Algorithm exploration for efficient public-key security processing on wireless handsets
-
Mar
-
N. Potlapally, S. Ravi, A. Raghunathan, and G. Lakshminarayana, Algorithm exploration for efficient public-key security processing on wireless handsets, in Proc. Design, Automation, and Test in Europe (DATE) Designers Forum, pp. 42-46, Mar. 2002
-
(2002)
Proc. Design, Automation, and Test in Europe (DATE) Designers Forum
, pp. 42-46
-
-
Potlapally, N.1
Ravi, S.2
Raghunathan, A.3
Lakshminarayana, G.4
|