메뉴 건너뛰기




Volumn , Issue , 2003, Pages 176-181

Securing mobile appliances: New challenges for the system designer

Author keywords

[No Author keywords available]

Indexed keywords

AMBIENT INTELLIGENCE; COMMERCIAL TECHNOLOGY; DESIGN METHODOLOGY; FUTURE APPLICATIONS; INTELLIGENT ELECTRONIC SYSTEMS; SECURITY CONSIDERATIONS; SMALL FORM FACTORS; SYSTEM ARCHITECTURES;

EID: 84893721283     PISSN: 15301591     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DATE.2003.1186383     Document Type: Conference Paper
Times cited : (10)

References (68)
  • 1
    • 84893804955 scopus 로고    scopus 로고
    • MeT PTD definition (version 1.1). /), Feb
    • MeT PTD definition (version 1.1). Mobile Electronic Transactions Ltd(http://www.mobiletransaction.org/), Feb. 2001
    • (2001) Mobile Electronic Transactions Ltd
  • 4
    • 0003775073 scopus 로고    scopus 로고
    • U. S. Department of Commerce
    • U. S. Department of Commerce, The Emerging Digital Economy II. http://www.esa.doc.gov/508/esa/TheEmergingDigitalEconomyII.htm, 1999
    • (1999) The Emerging Digital Economy II.
  • 5
    • 0004060599 scopus 로고    scopus 로고
    • World Wide Web Consortium
    • World Wide Web Consortium, The World Wide Web Security FAQ. http://www.w3.org/Security/faq/www-security-faq.html, 1998
    • (1998) The World Wide Web Security FAQ
  • 8
    • 0035395659 scopus 로고    scopus 로고
    • Facing the challenges of wireless security
    • July
    • S. K. Miller, Facing the Challenges of Wireless Security, IEEE Computer, vol. 34, pp. 46-48, July 2001
    • (2001) IEEE Computer , vol.34 , pp. 46-48
    • Miller, S.K.1
  • 12
    • 0036957308 scopus 로고    scopus 로고
    • Securing wireless data: System architecture challenges
    • Syn thesis October
    • S. Ravi, A. Raghunathan, and N. Potlapally, Securing wireless data: System architecture challenges, in Proc. Intl. Symp. System Synthesis, pp. 195-200, October 2002
    • (2002) Proc. Intl. Symp. System , pp. 195-200
    • Ravi, S.1    Raghunathan, A.2    Potlapally, N.3
  • 13
    • 84956860375 scopus 로고    scopus 로고
    • Experimenting with electronic commerce on the palmpilot
    • Feb
    • D. Boneh and N. Daswani, Experimenting with electronic commerce on the PalmPilot, in Proc. Financial Cryptography, pp. 1-16, Feb. 1999
    • (1999) Proc. Financial Cryptography , pp. 1-16
    • Boneh, D.1    Daswani, N.2
  • 17
    • 84892647098 scopus 로고    scopus 로고
    • IEEE 802.11 Wireless LAN Standards
    • IEEE 802.11 Wireless LAN Standards. IEEE 802.11 Working Group (http://grouper.ieee.org/groups/802/11/
    • IEEE 802.11 Working Group
  • 18
    • 84893803192 scopus 로고    scopus 로고
    • Bluetooth security white paper., Apr
    • Bluetooth security white paper. Bluetooth SIG Security Expert Group (http://www.bluetooth.com/), Apr. 2002
    • (2002) Bluetooth SIG Security Expert Group
  • 20
    • 0031170116 scopus 로고    scopus 로고
    • Weaknesses of north american wireless authentication protocol
    • june
    • S. Patel, Weaknesses of North American wireless authentication protocol, IEEE Personal Communications, vol. 4, pp. 40-44, june 1997
    • (1997) IEEE Personal Communications , vol.4 , pp. 40-44
    • Patel, S.1
  • 21
    • 0002917345 scopus 로고    scopus 로고
    • Unsafe at any key size: An analysis of the wep encapsulation
    • Oct
    • J. R. Walker, Unsafe at any key size: An analysis of the WEP encapsulation. IEEE document 802.11-00/362 (http://grouper.ieee.org/groups/802/ 11/Documents/), Oct. 2000
    • (2000) IEEE Document 802.11-00/362
    • Walker, J.R.1
  • 23
    • 0003063931 scopus 로고    scopus 로고
    • An inductive chosen plaintext attack against wep/wep2
    • May
    • W. A. Arbaugh, An inductive chosen plaintext attack against WEP/WEP2. IEEE document 802.11-01/230-(http://grouper.ieee.org/groups/802/11/Documents/), May 2001
    • (2001) IEEE Document 802.11-01/230
    • Arbaugh, W.A.1
  • 24
    • 0032124041 scopus 로고    scopus 로고
    • Mobility and security management in the GSM system and some proposed future improvements
    • July
    • A. Mehrotra and L. S. Golding, Mobility and security management in the GSM system and some proposed future improvements, Proceedings of the IEEE, vol. 86, pp. 1480-1497, July 1998
    • (1998) Proceedings of the IEEE , vol.86 , pp. 1480-1497
    • Mehrotra, A.1    Golding, L.S.2
  • 27
    • 0035386873 scopus 로고    scopus 로고
    • Wireless security
    • July
    • C. W. Blanchard, Wireless security, BT Technology Journal (http://www.bt.com/bttj/), vol. 19, pp. 67-75, July 2001
    • (2001) BT Technology Journal , vol.19 , pp. 67-75
    • Blanchard, C.W.1
  • 30
    • 84893772847 scopus 로고    scopus 로고
    • IPSec Working Group. http://www.ietf.org/html.charters/ipsec-charter.html
    • IPSec Working Group
  • 31
    • 84893792736 scopus 로고    scopus 로고
    • TLS Working Group. http://www.ietf.org/html.charters/tls-charter.html
    • TLS Working Group
  • 36
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security
    • NAI Labs, Network Associates, Inc., Glenwood MD Sept
    • D. W. Carman, P. S. Krus, and B. J. Matt, Constraints and approaches for distributed sensor network security, Tech. Rep. #00-010, NAI Labs, Network Associates, Inc., Glenwood, MD, Sept. 2000
    • (2000) Tech. Rep. #00-010
    • Carman, D.W.1    Krus, P.S.2    Matt, B.J.3
  • 43
    • 84958641478 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • E. Biham and A. Shamir, Differential fault analysis of secret key cryptosystems, Lecture Notes in Computer Science, vol. 1294, pp. 513-525, 1997
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 46
    • 0022218742 scopus 로고
    • Electromagnetic radiation from video display units: An eavesdropping risk?
    • W. Van Eck, Electromagnetic radiation from video display units: An eavesdropping risk?, Computers and Security, vol. 4, no. 4, pp. 269-286, 1985
    • (1985) Computers and Security , vol.4 , Issue.4 , pp. 269-286
    • Van Eck, W.1
  • 48
    • 0030107358 scopus 로고    scopus 로고
    • Network security under siege: The timing attack
    • March
    • E. English and S. Hamilton, Network security under siege: The timing attack, IEEE Computer, vol. 29, pp. 95-97, March 1996
    • (1996) IEEE Computer , vol.29 , pp. 95-97
    • English, E.1    Hamilton, S.2
  • 49
    • 84955621400 scopus 로고
    • Information Hiding Springer Lecture Notes in Computer Science
    • D. Aucsmith, Tamper Resistant Software: An Implementation, Information Hiding, Springer Lecture Notes in Computer Science, vol. 1174, pp. 317-333, 1986
    • (1986) Tamper Resistant Software: An Implementation , vol.1174 , pp. 317-333
    • Aucsmith, D.1
  • 51
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation-Tools for software protection
    • August
    • C. S. Collberg and C. Thomborson, Watermarking, tamper-proofing, and obfuscation-Tools for software protection, IEEE Transactions on Software Engineering, vol. 28, pp. 735-746, August 2002
    • (2002) IEEE Transactions on Software Engineering , vol.28 , pp. 735-746
    • Collberg, C.S.1    Thomborson, C.2
  • 52
    • 0012583179 scopus 로고    scopus 로고
    • Texas Instruments Inc
    • OMAP Platform-Overview. Texas Instruments Inc. (http://www.ti.com/sc/omap
    • OMAP Platform-Overview
  • 53
    • 0002449750 scopus 로고    scopus 로고
    • Subword parallelism with max-2
    • Aug
    • R. B. Lee, Subword Parallelism with Max-2, IEEE Micro, vol. 16, pp. 51-59, Aug. 1996
    • (1996) IEEE Micro , vol.16 , pp. 51-59
    • Lee, R.B.1
  • 55
    • 0035517885 scopus 로고    scopus 로고
    • Efficient permutations for fast software cryptography
    • Dec
    • R. B. Lee, Z. Shi, and X. Yang, Efficient Permutations for Fast Software Cryptography, IEEE Micro, vol. 21, pp. 56-69, Dec. 2001
    • (2001) IEEE Micro , vol.21 , pp. 56-69
    • Lee, R.B.1    Shi, Z.2    Yang, X.3
  • 56
    • 0034444066 scopus 로고    scopus 로고
    • Architectural support for fast symmetric-key cryptography
    • Nov
    • J. Burke, J. McDonald, and T. Austin, Architectural Support for Fast Symmetric-Key Cryptography, in Proc. Intl. Conf. ASPLOS, pp. 178-189, Nov. 2000
    • (2000) Proc. Intl. Conf. ASPLOS , pp. 178-189
    • Burke, J.1    McDonald, J.2    Austin, T.3
  • 57
    • 84893727726 scopus 로고    scopus 로고
    • SmartMIPS. http://www.mips.com
    • SmartMIPS
  • 59
    • 84893733465 scopus 로고    scopus 로고
    • Discretix Technologies Ltd
    • CryptocellTM. Discretix Technologies Ltd. (http://www.discretix.com
    • CryptocellTM
  • 60
    • 84893768971 scopus 로고    scopus 로고
    • Safenet Inc
    • Safenet EmbeddedIPTM. Safenet Inc. (http://www.safenet-inc.com
    • Safenet EmbeddedIPTM
  • 61
    • 67650516006 scopus 로고    scopus 로고
    • SLE 88 family
    • SLE 88 family. Infineon Technologies (http://www.infineon.com
    • Infineon Technologies
  • 63
    • 84893717539 scopus 로고    scopus 로고
    • Mobey Forum. http://www.mobeyforum.org/.
    • Mobey Forum
  • 64
    • 84893717823 scopus 로고    scopus 로고
    • Mobile Payment. http://www.mobilepaymentforum.org/.
    • Mobile Payment


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.