7.4 Endnotes


7.4 Endnotes

1. For more information about the Bluetooth SIG, see http://www.bluetooth.org .

2. Knight, Will. "Many Bluetooth Gadgets Open to Wireless Snooping," New Scientist , August 11, 2003 , at http://www.newscientist.com/news/news.jsp?id=ns99994041 .

3. This section is a special feature contributed by Dr. Tony Dubendorf.

4. Hallenborg, J. "PKI Technology May Be Great for Protection against Fraud, but the People Element Remains Crucial." Retrieved September 28, 2003 , from http://www.us-banker.com/usb/articles/usbfeb01-6.shtml .

5. The act is officially titled The Electronic Signatures in Global and National Commerce Act , S. 761, 106th Congress, 1st Session. For more information, see http://www.ecommercetax.com/doc/070200.htm .

6. Schneier, B. "Why Digital Signatures Are Not Signatures," November 15, 2000 . Retrieved September 28, 2003, from http://www.schneier.com/crypto-gram-0011.html .

7. Federal Information Processing Standards Publication 197, "Announcing the ADVANCED ENCRYPTION STANDARD (AES)," Washington, DC: United States National Institute of Standards, November 26, 2001 .

8. John G. Savard 's home page, "A Cryptographic Compendium," date unknown, at http://home.ecn.ab.ca/~jsavard/main.htm .




Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net