References
- Check Point Software Technologies. Check Point Full Disk Encryption. http://www.checkpoint.com/products/datasecurity/pc/index.html
- Utimaco Safeware. SafeGuard PDA. http://americas.utimaco.com/safeguard_pda/
- JEAG. Japan Email Anti-Abuse Group(JEAG), http://www.jeag.jp/ (Japanese only), 2005
- Inc.) Shane Coursena (Senior Technical Consultant aKaspersky Lab. The future of mobile malware. ScienceDirect - Network Security, 2007(8):7-11, 2007 https://doi.org/10.1016/S1353-4858(07)70072-7
- Mikko Hypponen. Malware Goes Mobile. Scientific American Magazine 2006, pages 70-77, 2006
- David Dagon, Tom Martin, and Thad Starner. Mobile Phones as Computing Devices: The Viruses are Coming! IEEE Pervasive Computing, 3(4):11-15, 2004 https://doi.org/10.1109/MPRV.2004.21
- Neal Leavitt. Mobile Phones: The Next Frontier for Hackers? Computer, 38(4):20-23, 4 2005 https://doi.org/10.1109/MC.2005.31
- David Johnston and Jesse Walker. Overview of IEEE 802.16 Security. IEEE Security & Privacy, 2(3):40-48, 6 2004
- Wayne Jansen and Rick Ayers. Guidelines on Cell Phone Forensics. Recommendations of the National Institute of Standards and Technology, Special Publication 800-101, http://csrc.nist.gov/publications/nistpubs/800-101/SP800-101.pdf, 5 2007
- Frank Adelstein. MFP: The Mobile Forensic Platform. International Journal of Digital Evidence (IJDE), 2(1), 2003
- Marwan Al-Zarouni. Mobile Handset Forensic Evidence: a challenge for Law Enforcement. In Proc. 4th Australian Digital Forensics Conference, 12 2006
- Marwan Al-Zarouni. Introduction to Mobile Phone Flasher Devices and Considerations for their Use in. Mobile Phone Forensics. In Proc. of 5th Australian Digital Forensics Conference, 12 2007
- Open Mobile Alliance. OMA Digital Rights Management V2.0. http://www.openmobilealliance.org/Technical/release_program/drm_v2_0.aspx,3 2006
- Airspan. Mobile Wimax Security. http://www.airspan.com/pdfs/WP_Mobile_WiMAX_Security.pdf, 2007
- WiMAX Forum. Mobile WiMAX . Part I: A Technical Overview and Performance Evaluation.http://www.wimaxforum.org/news/downloads/Mobile_WiMAX_Part1_Overview_and_Performance.pdf, 8 2006
- Taeshik Shon and Wook Choi. An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. Proc. of First International Conference Network-Based Information Systems (NBiS 2007), Lecture Notes in Computer Science 4658, pages 88-97, 8 2007 https://doi.org/10.1007/978-3-540-74573-0_10
- Andreas Deininger, Shinsaku Kiyomoto, Jun Kurihara, and Toshiaki Tanaka. Security Vulnerabilities and Solutions in Mobile WiMAX. IJCSNS International Journal of Computer Science and Network Security, 7(11):7-15, 11 2007
- H. Harney and C. Muckenhirn. Group Key Management Protocol (GKMP) Specification. RFC2093, http://ietf.org/rfc/rfc2093.txt, 7 1997
- H. Harney and C. Muckenhirn. Group Key Management Protocol (GKMP) Architecture. RFC 2094, http://ietf.org/rfc/rfc2094.txt, 7 1997
- D. Wallner, E. Harder, and R. Agee. Key Management for Multicast: Issues and Architectures. RFC2627, http://ietf.org/rfc/rfc2627.txt, 6 1999
- B. Weis, T. Hardjono, and H. Harney. The Group Domain of Interpretation. RFC3547, http://ietf.org/rfc/rfc3547.txt, 7 2003
- H. Harney, U. Meth, A. Colegrove, and G. Gross. GSAKMP: Group Secure Association Key Management Protocol. RFC4535, http://ietf.org/rfc/rfc4535.txt, 6 2006
- T. Hardjono and B. Weis. The Multicast Group Security Architecture. RFC3740, http://ietf.org/rfc/rfc3740.txt, 3 2004
- Chung Kei Wong and Mohamed Gouda and Simon S. Lam, "Secure Group Communications Using Key Graphs", "IEEE/ACM Trans. on Networking"
Cited by
- An enhanced security framework for reliable Android operating system vol.9, pp.6, 2016, https://doi.org/10.1002/sec.908
- Linear SVM-Based Android Malware Detection for Reliable IoT Services vol.2014, 2014, https://doi.org/10.1155/2014/594501
- A partially reconstructed previous Gmail session by live digital evidences investigation through volatile data acquisition vol.5, pp.10, 2012, https://doi.org/10.1002/sec.511