Skip to main content

Wireless Security

  • Chapter
  • 541 Accesses

Keywords

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   54.99
Price excludes VAT (Canada)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Rivest, A. Shamir and L. Adleman (1978) A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM, 21, pp. 120-126.

    CrossRef  MATH  MathSciNet  Google Scholar 

  2. W. Barker (1991) Introduction to the Analysis of the Data Encryption Stan- dard (DES). Laguna Hills, CA: Aegean Park Press.

    Google Scholar 

  3. J. Daemen and V. Rijmen (2001) Rijndael: The Advanced Encryption Stan- dard. Dr. Dobb’ Journal.

    Google Scholar 

  4. Public-Key Infrastructure (X.509) PKIX, http://www.ietf.org/html.charters/ pkix-charter.html

  5. Internet X.509 Public Key Infrastructure Certificate and CRL Profile, R. Housley, et al., January 1999.

    Google Scholar 

  6. WPKI, Wireless Public Key Infrastructure Definition, WAP Forum, 24 April 2001.

    Google Scholar 

  7. Internet X.509 Public Key Infrastructure Certificate and CRL Profile, R. Housley, et al., January 1999.

    Google Scholar 

  8. Internet X.509 Public Key Infrastructure - On-line Certificate Status Proto- col- OCSP, IETF RFC2560, M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, June 1999.

    Google Scholar 

  9. N. Koblitz (1987) Elliptic Curve Cryptosystem, Mathematics of Computa- tion, 48, 203-209.

    CrossRef  MATH  MathSciNet  Google Scholar 

  10. W. Diffie and M. E. Hellmn (1976) New Directions in Cryptography, IEEE Transactions on Information Theory. V. IT-22, n.6, pp. 644-654.

    CrossRef  MATH  Google Scholar 

  11. B. Dodson and A. Lenstra (1995) NFS with four large primes: an explosive experiment, Advances in Cryptology-CRYPTO’’5.

    Google Scholar 

  12. A.M. Odlyzko (1995) The future of integer factorization, CryptoBytes, l(2).

    Google Scholar 

  13. IEEE P1363, Standard Specifications for Public Key Cryptography, ballot draft, 1999. Drafts available at http://grouper.ieee.org/groups/1363/ index.html.

  14. ISO/IEC 14888-3, Information Technology - Security Techniques - Digital Signatures with Appendix - Part 3: Certificate Based-Mechanism, 1998.

    Google Scholar 

  15. ANSI X9.62, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), 1999.

    Google Scholar 

  16. ANSI X9.63, Public Key Cryptography for the Financial Services Industry: Elliptic Curve Key Agreement and Key Transport Protocols, working draft, August 1999.

    Google Scholar 

  17. National Institute of Standards and Technology, Digital Signature Standard, FIPS Publication 186-2, February 2000. Available at http://cstc.nist.gov/fips.

  18. WAP Wireless Transport Layer Security Specification, WAP Forum, 5 No- vember 1999.

    Google Scholar 

  19. P.L. Montgomery (1985) Modular Multiplication without trial division, Mathematics of Computation, 44, pp. 519-521.

    CrossRef  MATH  MathSciNet  Google Scholar 

  20. Menezes, T. Okamoto and S. Vanstone (1993) Reducing elliptic curve loga- rithms to logarithms in a finite field, IEEE Transactions on Information Theory, 39, pp. 1639-1646.

    CrossRef  MATH  MathSciNet  Google Scholar 

  21. Semae V (1998) Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p, Mathematics of Computation, 67, pp. 353-356.

    CrossRef  MathSciNet  Google Scholar 

  22. N. Smart (1999) The discrete logarithm problem on elliptic curves of trace one, Journal of Cryptology, 12, pp. 193-196.

    CrossRef  MATH  MathSciNet  Google Scholar 

  23. T. Satoh and K. Araki (1998) Fermat quotients and the polynomial time dis- crete log algorithm for anomalous elliptic curves, Commentarii Mathematici Universitatis Sancti Pauli, 47, pp. 81-92.

    MATH  MathSciNet  Google Scholar 

  24. D. Shanks (1971) Class number, a theory of factorization and genera. In 1969 Number Theory Institute (Proc. Sympos. Pure Math., Vol. XX, State Univ. New York, Stony Brook, Ny. 1969), pp. 415-440. Amer. Math. Soc., Providence, RI.

    Google Scholar 

  25. Certicom ECC Challenge, November 1997, http://www.certicom.com.

  26. Tom Karygiannis and Les Owens(2002) Wireless Network Security: 802.11, Bluetooth and Handheld Devices, NIST Special Publication 800-48.

    Google Scholar 

  27. IEEE P802.11i/D10.0 (2004) Medium Access Control (MAC) Security En- hancements, Amendment 6 to IEEE Standard for Information technology -Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications.

    Google Scholar 

  28. L. Blunk and J. Vollbrecht (1998) PPP Extensible Authentication Protocol (EAP), IETF RFC 2284.

    Google Scholar 

  29. Wireless LAN Security White Paper, Cisco Systems, http://www.cisco. com/warp/public/cc/pd/witc/ao1200ap/prodlit/wswpf_wp.pdf.

  30. H. Andersson, S. Josefsson, G. Zrn, D. Simon, and A. Palekar (2002) Pro- tected EAP Protocol (PEAP), IETF.

    Google Scholar 

  31. B. Aboba and D. Simon (1999) PPP EAP TLS Authentication Protocol, IETF RFC 2716.

    Google Scholar 

  32. C. He and J.C. Mitchell (2004) Analysis of the 802.11i 4-Way Handshake, Proceedings of the 2004 ACM workshop on Wireless security, pp. 43-50.

    Google Scholar 

  33. C. He and J.C. Mitchell, Security Analysis and Improvements for IEEE 802.11i, http://www.isoc.org/isoc/conferences/ndss/05/proceedings/papers/NDSS05-1107.pdf, 2005.

  34. Dictionary Attack on Cisco LEAP Vulnerability, Reversion 2.1, Cisco Sys- tems, http://www.cisco.com/warp/public/707/cisco-sn-20030802-leap.pdf.

  35. P.S. Pagliusi (2002) A Contemporary Foreword on GSM Security, Proceed- ings of the International Conference on Infrastructure Security, LNCS No. 2437, pp. 129-144, Springer-Verlag.

    Google Scholar 

  36. K. Boman, G. Horn, P. Howard and V. Niemi (2002) UMTS Security, Elec-tronics & Communication Engineering Journal, 14(5), pp. 191-204.

    CrossRef  Google Scholar 

  37. G.M. Koien (2004) An Introduction to Access Security in UMTS, IEEE Wireless Communication, 11(1), pp. 8-18.

    CrossRef  Google Scholar 

  38. Biryukov, A. Shamir and D. Wagner (2002) Real Time Cryptanalysis of A5/1 on a PC, in FSE 2000, LNCS No. 1978, Sp.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Lee, WB. (2006). Wireless Security. In: Kou, W., Yesha, Y. (eds) Enabling Technologies for Wireless E-Business. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30637-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30637-5_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30449-4

  • Online ISBN: 978-3-540-30637-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics