1 |
Wayne Jansen and Rick Ayers. Guidelines on Cell Phone Forensics. Recommendations of the National Institute of Standards and Technology, Special Publication 800-101, http://csrc.nist.gov/publications/nistpubs/800-101/SP800-101.pdf, 5 2007
|
2 |
D. Wallner, E. Harder, and R. Agee. Key Management for Multicast: Issues and Architectures. RFC2627, http://ietf.org/rfc/rfc2627.txt, 6 1999
|
3 |
B. Weis, T. Hardjono, and H. Harney. The Group Domain of Interpretation. RFC3547, http://ietf.org/rfc/rfc3547.txt, 7 2003
|
4 |
H. Harney, U. Meth, A. Colegrove, and G. Gross. GSAKMP: Group Secure Association Key Management Protocol. RFC4535, http://ietf.org/rfc/rfc4535.txt, 6 2006
|
5 |
T. Hardjono and B. Weis. The Multicast Group Security Architecture. RFC3740, http://ietf.org/rfc/rfc3740.txt, 3 2004
|
6 |
Chung Kei Wong and Mohamed Gouda and Simon S. Lam, "Secure Group Communications Using Key Graphs", "IEEE/ACM Trans. on Networking"
|
7 |
Taeshik Shon and Wook Choi. An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. Proc. of First International Conference Network-Based Information Systems (NBiS 2007), Lecture Notes in Computer Science 4658, pages 88-97, 8 2007
DOI
ScienceOn
|
8 |
Andreas Deininger, Shinsaku Kiyomoto, Jun Kurihara, and Toshiaki Tanaka. Security Vulnerabilities and Solutions in Mobile WiMAX. IJCSNS International Journal of Computer Science and Network Security, 7(11):7-15, 11 2007
|
9 |
H. Harney and C. Muckenhirn. Group Key Management Protocol (GKMP) Architecture. RFC 2094, http://ietf.org/rfc/rfc2094.txt, 7 1997
|
10 |
H. Harney and C. Muckenhirn. Group Key Management Protocol (GKMP) Specification. RFC2093, http://ietf.org/rfc/rfc2093.txt, 7 1997
|
11 |
David Dagon, Tom Martin, and Thad Starner. Mobile Phones as Computing Devices: The Viruses are Coming! IEEE Pervasive Computing, 3(4):11-15, 2004
DOI
ScienceOn
|
12 |
Neal Leavitt. Mobile Phones: The Next Frontier for Hackers? Computer, 38(4):20-23, 4 2005
DOI
ScienceOn
|
13 |
David Johnston and Jesse Walker. Overview of IEEE 802.16 Security. IEEE Security & Privacy, 2(3):40-48, 6 2004
|
14 |
Frank Adelstein. MFP: The Mobile Forensic Platform. International Journal of Digital Evidence (IJDE), 2(1), 2003
|
15 |
Marwan Al-Zarouni. Mobile Handset Forensic Evidence: a challenge for Law Enforcement. In Proc. 4th Australian Digital Forensics Conference, 12 2006
|
16 |
WiMAX Forum. Mobile WiMAX . Part I: A Technical Overview and Performance Evaluation.http://www.wimaxforum.org/news/downloads/Mobile_WiMAX_Part1_Overview_and_Performance.pdf, 8 2006
|
17 |
Marwan Al-Zarouni. Introduction to Mobile Phone Flasher Devices and Considerations for their Use in. Mobile Phone Forensics. In Proc. of 5th Australian Digital Forensics Conference, 12 2007
|
18 |
Open Mobile Alliance. OMA Digital Rights Management V2.0. http://www.openmobilealliance.org/Technical/release_program/drm_v2_0.aspx,3 2006
|
19 |
Airspan. Mobile Wimax Security. http://www.airspan.com/pdfs/WP_Mobile_WiMAX_Security.pdf, 2007
|
20 |
Check Point Software Technologies. Check Point Full Disk Encryption. http://www.checkpoint.com/products/datasecurity/pc/index.html
|
21 |
Utimaco Safeware. SafeGuard PDA. http://americas.utimaco.com/safeguard_pda/
|
22 |
JEAG. Japan Email Anti-Abuse Group(JEAG), http://www.jeag.jp/ (Japanese only), 2005
|
23 |
Inc.) Shane Coursena (Senior Technical Consultant aKaspersky Lab. The future of mobile malware. ScienceDirect - Network Security, 2007(8):7-11, 2007
DOI
ScienceOn
|
24 |
Mikko Hypponen. Malware Goes Mobile. Scientific American Magazine 2006, pages 70-77, 2006
|