Active Bibliography

88 Problem Areas for the IP Security Protocols – Steven M. Bellovin - 1996
2 Securing Mobile Appliances: New Challenges for the System Designer – Anand Raghunathan, Srivaths Ravi, Sunil Hattangady, Jean-Jacques Quisquater - 2003
24 Securing wireless data: System architecture challenges – Srivaths Ravi, Nachiketh Potlapally - 2002
Architectural Techniques for Enabling Secure Cryptographic Processing – John Patrick McGregor ,Jr. - 2005
321 Tinysec: A link layer security architecture for wireless sensor networks – Chris Karlof, Naveen Sastry, David Wagner
1 2002b) ‘Providing multi-layer security support for wireless communications across multiple trusted domains – Jiejun Kong, Mario Gerla, B. S. Prabhu, Rajit Gadh
41 The Final Nail in WEP’s Coffin – Andrea Bittau, Mark Handley, Joshua Lackey - 2006
3 An Experience Teaching a Graduate Course in Cryptography – Aviel D. Rubin - 1997
EOT278 INTERNET SECURITY – unknown authors
1 On Securing Wireless LANs and Supporting Nomadic Users with Microsoft’s IPSec Implementation – Rodrigo Blanco Rincon, Günter Schäfer - 2002
96 Using the Fluhrer, Mantin, and Shamir Attack to Break WEP – Adam Stubblefield, John Ioannidis, Aviel D. Rubin - 2001
IP telephony: mobility and security – Jon-Olov Vatn - 2005
32 A Taxonomy Of Computer Attacks With Applications To Wireless Networks – Daniel Lowry Lough - 2001
Probable plaintext cryptanalysis of . . . – Steven M. Bellovin - 1997
27 Probable Plaintext Cryptanalysis of the IP Security Protocols – Steven M. Bellovin - 1997
4 Statistical Cryptanalysis of Block Ciphers – Pascal Junod - 2004
3 When Cryptography Meets Storage – Sarah M. Diesburg, Christopher R. Meyers, David M. Lary, An-i Andy Wang
32 The evolution of the Kerberos authentication service – John T. Kohl, B. Clifford Neuman - 1994
1 Enhanced WEP: An efficient solution to WEP threats – Hani Ragab Hassan, Yacine Challal - 2005