Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
R. Rivest, A. Shamir and L. Adleman (1978) A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM, 21, pp. 120-126.
W. Barker (1991) Introduction to the Analysis of the Data Encryption Stan- dard (DES). Laguna Hills, CA: Aegean Park Press.
J. Daemen and V. Rijmen (2001) Rijndael: The Advanced Encryption Stan- dard. Dr. Dobb’ Journal.
Public-Key Infrastructure (X.509) PKIX, http://www.ietf.org/html.charters/ pkix-charter.html
Internet X.509 Public Key Infrastructure Certificate and CRL Profile, R. Housley, et al., January 1999.
WPKI, Wireless Public Key Infrastructure Definition, WAP Forum, 24 April 2001.
Internet X.509 Public Key Infrastructure Certificate and CRL Profile, R. Housley, et al., January 1999.
Internet X.509 Public Key Infrastructure - On-line Certificate Status Proto- col- OCSP, IETF RFC2560, M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, June 1999.
N. Koblitz (1987) Elliptic Curve Cryptosystem, Mathematics of Computa- tion, 48, 203-209.
W. Diffie and M. E. Hellmn (1976) New Directions in Cryptography, IEEE Transactions on Information Theory. V. IT-22, n.6, pp. 644-654.
B. Dodson and A. Lenstra (1995) NFS with four large primes: an explosive experiment, Advances in Cryptology-CRYPTO’’5.
A.M. Odlyzko (1995) The future of integer factorization, CryptoBytes, l(2).
IEEE P1363, Standard Specifications for Public Key Cryptography, ballot draft, 1999. Drafts available at http://grouper.ieee.org/groups/1363/ index.html.
ISO/IEC 14888-3, Information Technology - Security Techniques - Digital Signatures with Appendix - Part 3: Certificate Based-Mechanism, 1998.
ANSI X9.62, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), 1999.
ANSI X9.63, Public Key Cryptography for the Financial Services Industry: Elliptic Curve Key Agreement and Key Transport Protocols, working draft, August 1999.
National Institute of Standards and Technology, Digital Signature Standard, FIPS Publication 186-2, February 2000. Available at http://cstc.nist.gov/fips.
WAP Wireless Transport Layer Security Specification, WAP Forum, 5 No- vember 1999.
P.L. Montgomery (1985) Modular Multiplication without trial division, Mathematics of Computation, 44, pp. 519-521.
Menezes, T. Okamoto and S. Vanstone (1993) Reducing elliptic curve loga- rithms to logarithms in a finite field, IEEE Transactions on Information Theory, 39, pp. 1639-1646.
Semae V (1998) Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p, Mathematics of Computation, 67, pp. 353-356.
N. Smart (1999) The discrete logarithm problem on elliptic curves of trace one, Journal of Cryptology, 12, pp. 193-196.
T. Satoh and K. Araki (1998) Fermat quotients and the polynomial time dis- crete log algorithm for anomalous elliptic curves, Commentarii Mathematici Universitatis Sancti Pauli, 47, pp. 81-92.
D. Shanks (1971) Class number, a theory of factorization and genera. In 1969 Number Theory Institute (Proc. Sympos. Pure Math., Vol. XX, State Univ. New York, Stony Brook, Ny. 1969), pp. 415-440. Amer. Math. Soc., Providence, RI.
Certicom ECC Challenge, November 1997, http://www.certicom.com.
Tom Karygiannis and Les Owens(2002) Wireless Network Security: 802.11, Bluetooth and Handheld Devices, NIST Special Publication 800-48.
IEEE P802.11i/D10.0 (2004) Medium Access Control (MAC) Security En- hancements, Amendment 6 to IEEE Standard for Information technology -Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications.
L. Blunk and J. Vollbrecht (1998) PPP Extensible Authentication Protocol (EAP), IETF RFC 2284.
Wireless LAN Security White Paper, Cisco Systems, http://www.cisco. com/warp/public/cc/pd/witc/ao1200ap/prodlit/wswpf_wp.pdf.
H. Andersson, S. Josefsson, G. Zrn, D. Simon, and A. Palekar (2002) Pro- tected EAP Protocol (PEAP), IETF.
B. Aboba and D. Simon (1999) PPP EAP TLS Authentication Protocol, IETF RFC 2716.
C. He and J.C. Mitchell (2004) Analysis of the 802.11i 4-Way Handshake, Proceedings of the 2004 ACM workshop on Wireless security, pp. 43-50.
C. He and J.C. Mitchell, Security Analysis and Improvements for IEEE 802.11i, http://www.isoc.org/isoc/conferences/ndss/05/proceedings/papers/NDSS05-1107.pdf, 2005.
Dictionary Attack on Cisco LEAP Vulnerability, Reversion 2.1, Cisco Sys- tems, http://www.cisco.com/warp/public/707/cisco-sn-20030802-leap.pdf.
P.S. Pagliusi (2002) A Contemporary Foreword on GSM Security, Proceed- ings of the International Conference on Infrastructure Security, LNCS No. 2437, pp. 129-144, Springer-Verlag.
K. Boman, G. Horn, P. Howard and V. Niemi (2002) UMTS Security, Elec-tronics & Communication Engineering Journal, 14(5), pp. 191-204.
G.M. Koien (2004) An Introduction to Access Security in UMTS, IEEE Wireless Communication, 11(1), pp. 8-18.
Biryukov, A. Shamir and D. Wagner (2002) Real Time Cryptanalysis of A5/1 on a PC, in FSE 2000, LNCS No. 1978, Sp.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Lee, WB. (2006). Wireless Security. In: Kou, W., Yesha, Y. (eds) Enabling Technologies for Wireless E-Business. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30637-5_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-30637-5_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30449-4
Online ISBN: 978-3-540-30637-5
eBook Packages: Computer ScienceComputer Science (R0)
