Information Technology Reference
In-Depth Information
Engineering in the University of Palermo, Italy: Bono, Carlini, Castellucci,
Cavaliere, Cimò, Colomba, Cutini, Giglia, Greco, Mauro, Nicotra, Panzavecchia
and Patti.
Authors would also like to thank Giovanni Pilato for his help in the
Italian-English translation.
References
[1] Skow, E., Kong, J., Phan, T., Cheng, F., Guy, R., Bagrodia, R., Gerla,
M. & Lu, S., A security architecture for application session handoff.
Proc. IEEE Int. Conf. on Communications ICC , 4 , pp. 2058-2063,
2002.
[2] Stajano, F. & Anderson, R., The resurrecting duckling: security issues
for ubiquitous computing, IEEE Computer , 35(4) , pp. 22-26, 2002.
[3] Summers, R.C., Secure Computing: Threats and Safeguards , McGraw-
Hill: Hightstown, NJ, 1997.
[4] Stallings, W., Network Security Essentials: Application and Standards ,
Pearson Education, New York, 2nd edn, 2007.
[5] McGrath, R.E., Discovery and Its Discontents: Discovery Protocols for
Ubiquitous Computing , University of Illinois at Urbana-Champaign,
Champaign, IL, Technical Report UIUCDCS-R-99-2132, April 2000.
[6] Merkle, R. A certified digital signature, Advances in Cryptology -
CRYPTO '89, Lecture Notes in Computer Science , ed. G. Brassard,
Springer-Verlag: Santa Barbara, CA, Vol. 435, pp. 218-238, 1990.
[7] Canetti, R., Universally composable signature, certification, and authenti-
cation. Proc. 17th IEEE Computer Security Foundations Workshop,
CSFW , pp. 219-233, 2004.
[8] Muller, T., Bluetooth Security Architecture: Version 1.0 , Bluetooth White
Paper, Document # 1.C.116/1.0, July 15, 1999.
[9] Janssens, S., Preliminary Study: Bluetooth Security , January 2005,
http://drdeath.myftp.org:881/books/Bluetooth_security.pdf, retrieved on
June 2009.
[10] Sun, J., Howie, D., Koivisto, A. & Sauvola, J., Design, Implementation,
and Evaluation of Bluetooth Security , www.mediateam.oulu.fi/
publications/pdf/87.pdf, retrieved on June 2009.
[11] Willekens, J.P.F., Ad-hoc routing in Bluetooth, Lecture Notes in
Computer Science , 2213 , pp. 130-144, 2001.
[12] Steiner, J.G., Clifford Neuman, B. & Schiller, J.I., Kerberos: an
authentication service for open network systems, Proc. Winter 1988
Usenix Conference , February 1988.
[13] Silverman, M. & Liu, S., A practical guide to biometric security
technology, IEEE IT Professional , 3(1) , pp. 27-32, 2001.
[14] Matthews, A., Side-channel attacks on smartcards, Network Security ,
2006(12) , pp. 18-20, 2006.
 
 
Search WWH ::




Custom Search