Information Technology Reference
In-Depth Information
[15] Yaniv Shaked, A., Cracking the Bluetooth PIN , School of Electrical
Engineering Systems, Tel Aviv University, http://www.eng.tau.ac.il/
~yash/shaked-wool-mobisys05/, retrieved on June 2009.
[16] Vainio, J.T., Bluetooth Security , Helsinki University of Technology,
http://www.iki.fi/jiitv/bluesec.pdf, retrieved on June 2009.
[17] Jakobsson, M. & Wetzel, S., Security weaknesses in Bluetooth. Proc.
2001 Conf. on Topics in Cryptology: the Cryptographer's Track At
RSA , April 08-12, ed. D. Naccache, Lecture Notes in Computer
Science, vol. 2020. Springer-Verlag: London, pp. 176-191, 2001.
[18] Xydis, T.G. & Blake-Wilson, S., Security Comparison: Bluetooth
Communications vs. 802.11 , Bluetooth Security Expert Group, http://
merlot.usc.edu/cs530-s05/papers/Xydis02a.pdf, retrieved on June 2009.
[19] Stanley, R.A., Wireless LAN risks and vulnerabilities, Information
Systems Control Journal , 2 , 2002.
[20] Borisov, N., Goldberg, I. & Wagner, D. Intercepting mobile
communications: the insecurity of 802.11, Proc. 7th Ann. Int. Conf.
Mobile Computing and Networking , Rome, Italy. MobiCom '01. ACM:
New York, NY, pp. 180-189, 2001. DOI: 10.1145/381677.381695.
[21] http://www.stumbler.net/
[22] http://www.netstumbler.org
[23] http://www.kismetwireless.net
[24] Fluhrer, S.R., Mantin, I. & Shamir, A., Weaknesses in the key scheduling
algorithm of RC4, Revised Papers From the 8th Annual international
Workshop on Selected Areas in Cryptography , August 16-17, eds. S.
Vaudenay & A. M. Youssef, Lecture Notes in Computer Science, vol.
2259. Springer-Verlag: London, pp. 1-24, 2001.
[25] http://airsnort.shmoo.com/
[26] http://www.aircrack-ng.org/doku.php
[27] WEPCrack, an 802.11 key breaker, http://wepcrack.sourceforge.net/
[28] WEPCrack at SourceForge.Net, http://souceforge.net/projects/wepcrack
[29] Ethereal: a network protocol analyzer, http://www.ethereal.com
Search WWH ::




Custom Search