Bibliography

Bibliography

"Analysis of Provisions of the Proposed Anti-Terrorism Act of 2001: Affecting the Privacy of Communications and Personal Information." The Electronic Privacy Information Center Web site [cited 18 December 2001]. http://www.epic.org/privacy/terrorism/ata_analysis.html.

Andersson, C. GPRS and 3G Wireless Applications. New York: John Wiley and Sons, 2001.

Arbaugh, W., N. Shankar, and Y. C.J. Wan. "Your 802.11 Wireless Network Has No Clothes." The University of Maryland, William A. Arbaugh Web site, 2001. http://www.cs.umd.edu/~waa/wireless.pdf.

Arehart, C. et al. Professional WAP. Birmingham, UK: Wrox Press Ltd., 2001.

Avery, M. "Putting 802.11b to the Test." In NetworkWorldFusion, 2001 [cited 24 April 2001]. http://www.nwfusion.com/revieows/2001/0205rev.html.

Batista, E. "No Last-Minute Rush for E911." 2001 [cited 17 December 2001]. http://wired.com/news/print/0,1294,47220,00.html.

Batista, E. "A Fight to Ban Cellphone Spam." 2000 [cited 10 May 2001]. http://www.wired.com/news/print/0,1294,37376,00.html.

Batista, E. "Consumer Coupons Going Mobile." 2000 [cited 17 December 2001]. http://www.wired.com/news/print/0,1294,37577,00.html.

Batista, E. "Blackberry Turns a New Page." 2001 [cited 10 May 2001]. http://www.wired.com/news/print/0,1294,43624,00.html.

Borisov, N., I. Goldberg, and D. Wagner. "Intercepting Mobile Communications: The Insecurity of 802.11." The University of California, Berkeley, Internet Security, Applications, Authentication, and Cryptography (ISAAC) Web site, 2001. http://www.isaac.cs.berkeley.edu/isaac/mobicom.pdf.

Borland, John. "Wireless Web Privacy Hole Still Wide Open." 2000 [cited 17 December 2001]. http://news.cnet.com/news/0-1004-200-2546734.html?tag=prntfr.

Boulton, C. "allNetDevices: 802.11 Subject to Hacks." Cited 17 December 2001. http://www.allnetdevices.com/developer/news/2001/02/06/80211_subject.html.

Brown, D. "Wireless Privacy Legislation Coming." In Interactive Week, 2001 [cited 17 December 2001]. http://zdnet.com/zdnn/stories/news/0,4586,2765638,00.html.

"Cellular Telephones." Cited 17 December 2001. http://www.smdc.army.mil/SecurityGudie/v2comint/Cellular.htm.

"Cellular Telephones." Cited 17 December 2001. http://users.dhp/com/~bishop/cellular.html.

Champness, Angela. "IEEE 802.11 DSSS: The Path to High-Speed Wireless Data Networking." 2001 [cited 6 April 2001]. http://www.ydi.com/pdf/weca80211.pdf.

Charny, B. "Could E911 Have Helped in Disaster?" 2001 [cited 17 December 2001]. http://news.cnet.com/news/0-1004-200-7139433.html.

"Connected Device Configuration (CDC) and the Foundation Profile." Technical white paper, Sun Microsystems [cited 31 July 2001]. http://www.sun.com.

Crowe, D. "CALEA: How Will It End?" 2001 [cited 18 December 2001]. http://industryclick.com//magazinearticle.asp?magazinearticleid=134402.

"CTIA Proposes Wireless Privacy Steps." Cited 17 December 2001. http://www.allnetdevices.com/wireless/news/2000/11/28/ctia_proposes.html.

Cukier, K.N. "Big Brother in the Air." Cited 17 December 2001. http://www.redherring.com/mag/issue78/mag-brother/78.html.

CyberCrime staff. "Turn the Tables on Cellphone Snoops." May 1, 2001 [cited 17 December 2001]. http://www.techtv.com/cybercrime/print/0,23102,8201,00.html.

>Electronic Privacy Information Center (EPIC) et al. The Federal Communications Commission. Reply comments in the matter of Telecommunications Carriers' Use of Customer Proprietary Network Information, November 16, 2001 [cited 17 December 2001]. http://www.epic.org/privacy/cpni/CPNI_Reply_Comments.html.

Davis, Noel. "PalmOS, Half-Life Server, and Ethereal Vulnerabilities." In O'Reilly Network, 2001 [cited 6 April 2001]. http://www.oreillynet.com/pub/a/linux/2001/01/02/insecurities.html.

Dempsey, J.X. U.S. House Committee on Commerce on the Wireless Privacy Enhancement Act of 1999 and the Wireless Communications and Public Safety Enhancement Act of 1999. Subcommittee on Telecommunications, Trade, and Consumer Protection. Statement of James X. Dempsey, Senior Staff Counsel, Center for Democracy and Technology, February 3, 1999.

Dempsey, J.X., D. Mulligan, C. K. Ridder, and E. Katz. U.S. Federal Communications Commission, Washington, D.C. Comments of the Center for Democracy and Technology in the Matter of Petition of the Cellular Telecommunications Industry Association for a Rulemaking to Establish Fair Location Information Practices, 2001.

Disabatino, J. "Will 'Carnivore' Intercept Wireless Email?" 2001 [cited 17 December 2001]. http://wireless.newsfactor.com/perl/story/13207.html.

"Fact Sheet: E911 Phase II Decisions." Cited 17 December 2001. http://www.fcc.gov/Bureaus/Wireless/News_Releases/2001/nwl0127a.pdf.

"Flexible Architecture for Innovative Solutions." 2001 [cited 31 July 2001]. http://www.palmos.com/platform/architecture.html.

Flickenger, Rob. "802.11b Tips, Tricks, and Facts." In O'Reilly Network, 2001 [cited 6 April 2001]. http://www.oreillynet.com/pub/a/wireless/2001/03/02/802.11b_facts.html.

Flickenger, Rob. "Using SSH Tunneling." In O'Reilly Network, 2001 [cited 6 April 2001]. http://www.oreillynet.com/pub/a/wireless/2001/02/23/wep.html.

France, M. and D. Berman. "Big Brother Calling." In Business Week Online, 2000 [cited 17 December 2001]. http://www.businessweek.com/2000/00_39/b3700104.htm.

Fratto, M. "Tutorial: Wireless Security." In Network Computing, 2001 [cited 30 April 2001]. http://www.networkcomputing.com/1202/1202f1d1.html.

Garcia, A. "WEP Remains Vulnerable." In ZDNet News, 2001 [cited 30 April 2001]. http://www.eweek.com/article/0,3658,s%253D709%2526a%253D9207,00.asp.

Gartner, J. "Bluetooth Comes to Your Notebook." 2000 [cited 10 May 2001]. http://www.wired.com/news/print/0,1294,40190,00.html.

"Getting a Grip on Wireless: Selecting the Right Device Part One." April 25, 2001 [cited 30 April 2001]. http://www.outr.net/download_newsletter_devices_part1.htm.

Ghosh, A. E-Commerce Security and Privacy. Boston: Kluwer Academic Publishers, 2001.

Ghosh, A. K. and T. M. Swaminatha, "Software Security and Privacy Risks in Mobile E-Commerce," Communications of the ACM, (44), no. 2 (February 2001): 51 57.

Giguere, E. Java 2 Micro Edition. New York: John Wiley and Sons, 2002.

Givens, B. "Privacy Laws of the State of California." 1997 [cited 18 December 2001]. http://www.privacyrights.org/ar/callaw.htm.

Gold, Steve. "Privacy Storm Brewing over Mobile Phone Location Tech." 2000 [cited 17 December 2001]. http://www.computeruser.com/news/00/11/13/news14.html.

Gomes, L. "Is There a Hole in Your Wireless Network?" 2001 [cited 30 April 2001]. http://www.zdnet.com.au/newstech/communications/story/0,2000024993,20218522,00.htm.

Gonsalves, A. "Certicom Readies Wireless Security Product." 2000 [cited 30 April 2001]. http://content.techweb.com/wire/story/TWB20000915S0012.

"Handheld Devices: Comparing the Major Platforms." December 2000 [cited 12 July 2001]. http://www.dell.com/us/en/biz/topics/vectors_2000-handhelds.htm.

"Hardware Comparison Matrix." 2001 [cited 31 July 2001]. http://www.palmos.com/dev/tech/hardware/compare.html.

Harvey, J.A. and C. Rosselli. "Emerging Wireless Privacy Issues and the Law." Cited 17 December 2001. http://www.gigalaw.com/articles/2001/harvey-2001-07-p2.html.

Hererra, Chris. "Technical Analysis: Comparing Windows CE with Palm OS REBUTTAL." 1999 [cited 31 July 2001]. http://www.cewindows.net/wce/windowsce-palm.htm.

"How Bluetooth Short-Range Radio Systems Work." Cited 24 April 2001. http://www.howstuffworks.com/bluetooth.htm?printable=1.

http://www.bluetooth.org.

http://www.handspring.com.

http://www.ieee.org.

http://www.microsoft.com.

http://www.palm.com.

http://www.blackberry.net.

http://www.wapforum.org.

Hutchinson, C., J. Kleinman, and D. R. Straw, eds. ARRL Handbook for Radio Amateurs. American Radio Relay League, 1990.

Jamsa, K.A. and P. Schmauder. Wireless Application Programmer's Library. Roseville, California: Prima Tech, 2000.

"Introduction to Palm OS Programming." Cited 31 July 2001. http://www.palmos.com/dev/intro.html.

Kallender, P. "Omron Uses GPS to Catch a Car Thief." 2001 [cited 17 December 2001]. http://www.eetimes.com/story/OEG20010612S0059.

Kennedy, C. J. "The Handheld Wars: Beta Max Wars Revisited." In Wireless Business and Technology Magazine, (1), 2001. http://sys-con.com/wireless//articleprint.cfm?id=70.

Knight, W. "Hacking Threat Goes Mobile." In ZDNet UK, 2001 [cited 30 April 2001]. http://news.zdnet.co.uk/story/0,,t269-s2085837,00.html.

Kingpin, "Palm OS Password Lockout Bypass." The //www.atstake.com/research/advisories/2001/a030101-1.txt. Knight, W. "Prank Leads to Fears about Mobile Security." In ZDNet UK, 2000 [cited 30 April 2001]. http://www.zdnet.co.uk/news/2000/31/ns-17205.html.

Knight, Will. "3G: Will 3G Devices Be Secure?" In ZDNet UK, 2000 [cited 30 April 2001]. http://www.zdnet.co.uk/news/2000/33/ns-17466.html.

Lemos, Robert. "Handhelds Are the New Targets for Viruses." In ZDNet News, 2001 [cited 30 April 2001]. http://www.zdnet.co.uk/news/2001/11/ns-21689.html.

Lemos, Robert. "Wireless Networks Lure Hackers." In ZDNet News [cited 12 July 2001]. http://zdnet.com.com/2100-1105-269853.html.

Lillington, K. "Irish Know Where You've Been." 2001 [cited 17 December 2001]. http://www.wired.com/news/print/0,1294,48251,00.html.

Lindstrom, A. "Security vs. Privacy." 2001 [cited 18 December 2001]. http://industryclick.com//magazinearticle.asp?magazinearticleid=132961.

Lipschulz, D. "Security Issues Tether Wireless." 2001 [cited 11 June 2001]. http://www.redherring.com/index.asp?layout=storyandchannel=10000001anddoc_id=1370019537.

Lough, D. L., T. K. Blankenship, and K. J. Krizman. "A Short Tutorial on Wireless LANs and IEEE 802.11." 2001 [cited 6 April 2001]. http://www.computer.org/students/looking/summer97/ieee802.htm.

Luening, E. "Don't Be Fooled: DCS1000 Still a 'Carnivore' at Heart." In ZDNet News, 2001 [cited 18 December 2001]. http://www.tecsoc.org/persec/webwatch/usa.htm.

Luening, E. "Cell Phone Locator Snags Funds from Intel, Ericsson." 2001 [cited 17 December 2001]. http://news.cnet.com/news/0-1004-200-4767309.html.

McDonough, B. "Wireless: The Next Battle in Privacy." 2001 [cited 17 December 2001]. http://content.techweb.com/wire/story/TWB20010306S0018.

McGraw, G. Securing Java. New York: John Wiley and Sons, 1999.

Mettala, R. "Bluetooth Protocol Architecture Version 1.0." 1999. http://www.bluetooth.org.cn/documents/ProtArch.pdf.

Miller, B. "Mapping Salutation Architecture APIs to Bluetooth Service Discovery Layer Version 1.0." 1999. http://www.salutation.org/whitepaper/BtoothMapping.PDF.

"Mobile Device Management and Security Survey." May 14, 2001. http://www.afaria.com/public/pdfs/products/afaria/literature/white_papers/MobileSecuritySurvey.pdf.

"New Features in Palm OS 4.0 and the m50x Series." March 9, 2001 [cited 31 July 2001]. http://www.palminfocenter.com/print.asp?ID=1697.

Niskanen, P. Inside WAP: Programming Applications with WML and WMLScript. Boston: Addison-Wesley, 2001.

"Palm OS 4.0 Development Overview." 2001 [cited 31 July 2001]. http://www.palmos.com/dev/tech/docs/palmos40.

Pelofsky, J. "Privacy U.S. Wireless Firms Choose Opt-in to Protect Privacy." 2001 [cited 17 December 2001]. http://www.washtech.com/news/regulation/10264-1.html.

Perine, K. "Talking about Wireless Privacy." In The Industry Standard, December 25, 2000 [cited 17 December 2001]. http://www.thestandard.com/article/display/0,1151,20860,00.html.

Perkins, C., ed. Ad Hoc Networking. Boston: Addison-Wesley, 2001.

Peterson, M. M. "House Panel Votes to Create New Privacy Commission." In Government Executive Magazine, 2001 [cited 17 December 2001]. http://www.govexec.com/dailyfed/0501/051001njns.htm.

Phifer, L. "Wireless Privacy: An Oxymoron?" 2001 [cited 17 December 2001]. http://www.80211-planet.com/columns/article/0,4000,1781_786641,00.html.

Pinna, Bob. "Security The Necessary Evil." In Wireless Business and Technology Magazine, (1), 2001. http://sys-con.com/wireless//articleprint.cfm?id=67.

Radding, A. "Crossing the Wireless Security Gap." In Computer World, 2001 [cited 30 April2001]. http://www.computerworld.com/storyba/0,4125,NAV47_STO55583,00.html.

Raul, A. "O Customer, Where Art Thou?" 2001 [cited 17 December 2001]. http://www.business2.com/articles/mag/print/0,16943,9304,FF.html.

Robinson, S. "Cell Phone Flaw Opens Security Hole." In Interactive Week, 2000 [cited 17 December 2001]. http://www.zdnet.com/zdnn/stories/news/0,4586,2628754,00.html.

Russell, D. and G.T. Gangemi, Sr. Computer Security Basics. Sebastopol, California: O'Reilly and Associates, 1991.

Sanei, S. "Building Applications for BlackBerry Wireless Handhelds." 2001. http://www.blackberry.net/developers/na/c_plus/knowledge/presentations/download/motient_partner.pdf.

Santalesa, Rich. "The War over 802.11x Security." In ZDNet News, 2001 [cited 11 July 2001]. http://zdnet.com.com/2100-1107-503897.html?legacy=zdnn.

Savage, M. and A. Stirpe. "Under Surveillance." 2000 [cited 17 December 2001]. http://www.crn.com/Components/Search/Article.asp?ArticleID=22049.

Schiller, J. Mobile Communications. Boston: Addison-Wesley, 2000.

Schlichting, J. D. "The Regulatory Backdrop: Wireless E911, CPNI, and the Wireless Communications and Public Safety Act of 1999." 2000 [cited 17 December 2001]. http://www.fcc.gov/911/enhanced/regbackdrop.pdf.

Seifried, K. "802.11 Wireless Security." 2001 [cited 30 April 2001]. http://www.securityportal.com/closet/closet20010207.printerfriendly.html.

Shim, R. "Report: Bluetooth Not Making the Connection." In ZDNet News, 2001 [cited 30 April 2001]. http://www.zdnetindia.com/news/features/stories/20718.html.

Singhal, S. et al. WAP-the Wireless Application Protocol: Writing Applications for the Mobile Internet. Boston: Addison-Wesley, 2001.

Smith, R. "E911: Big Brother's Tracking System." 2000 [cited 17 December 2001]. http://www.privacyfoundation.org/commentary/print.asp?id=23andaction=0.

Somogyi, Stephan. "802.11 and Swiss Cheese." In ZDNet News, 2001 [cited 18 April 2001]. http://zdnet.com.com/2100-11-529256.html.

Sovocool, D.R. "GPS Tracking Case Raises Privacy Issues." 2000 [cited 17 December 2001]. http://thelenreid.com/articles/article/art_61.html.

Speir, M. "BlackBerry Pushes a Sweet Solution." 2000 [cited 25 July 2001]. http://www.fcw.com/.

Springboard Platform. White paper, March 2001 [cited 31 July 2001]. http://www.handspring.com.

Stenger, Richard. "Rental Driver Finds Big Brother over Shoulder." 2001 [cited 17 December2001]. http://www.cnn.com/2001/TECH/ptech/06/22/gps.airiq/.

Stubblefield, A., J. Ionnidis, and A. Rubin. "Using the Fluhrer, Mantin, and Shamir Attack to Break WEP." The Rice University, Adam Stubblefield Web site, 2001. http://www.cs.rice.edu/~astubble/wep/wep_attack.pdf.

Tanenbaum, Andrew S. Computer Networks. New Jersey: Prentice-Hall, Inc., 1981.

"Technical White Paper BlackBerry Enterprise Edition." 2001 [cited 31 July 2001]. http://www. blackberry.net.

"Technical White Paper BlackBerry Security." 2001 [cited 31 July 2001]. http://www. blackberry.net.

"The Systems Management Challenge in the Mobile and Wireless Enterprise." November 2000. http://www.afaria.com/public/pdfs/products/afaria/literature/white_papers/mobile_insight s.pdf.

Thibodeau, P. "Wireless E-Commerce Gets Mixed Reviews at FTC Workshop." 2000 [cited 17 December 2001]. http://www.nwfusion.com/news/2000/1214ftcwireless.html.

Thompson, Clive. "New Inventions Try to Simplify an Infuriating Task: How to Write E-Mail on a Mobile Phone." In GlobeTechnology.com, 2001 [cited 1 May 2001]. http://www.globetechnology.com/robmag/robmagmay_02.html.

"Top Ten Pitfalls of Wireless Application Development." March 12, 2001 [cited 30 April 2001]. http://www.outr.net/download_newsletter_toptenpitfalls.htm.

Torrieri, M. "AllNetDevices: Do Consumers Want Location Services?" In Wireless Data News, (8), no. 16, August 7, 2000 [cited 17 December 2001]. http://www.allnetdevices.com/wireless/opinions/2000/08/07/do_consumers.html.

van der Heijden, M. and M. Taylor, eds. Understanding WAP: Wireless Applications, Devices, and Services. Boston: Artech House, 2000.

Veitch, M. "BlackBerry Device Puts Email in Motion." 2001 [cited 25 July 2001]. http://news.zdnet.co.uk/story/0,s2085584,00.html.

Viega, J. and G. McGraw. Building Secure Software: How to Avoid Security Problems the Right Way. Boston: Addison-Wesley, 2002.

Viterbi, A. CDMA: Principles of Spread Spectrum Communication. Reading, Massachusetts: Addison-Wesley, 1995.

WAP Forum. "Wireless Telephony Application Specification." Technical report WAP-169-WTA, July 7, 2000. http://www.wapforum.org.

WAP Forum. "Wireless Telephony Interface Specification." Technical report WAP-170-WTAI, July 7, 2000. http://www.wapforum.org.

WAP Forum. "WAP Architecture: Wireless Application Protocol Architecture Specification." Technical report, April 30, 1998. http://www.wapforum.org.

WAP Forum. "Wireless Application Environment Specification v. 1.3." Technical report WAP-190-WAESpec, March 29, 2000. http://www.wapforum.org.

WAP Forum. "Wireless Markup Language Script Specifications v.1.2." Technical report WAP-193-WMLScript, June 2000. http://www.wapforum.org.

Weatherspoon, S. "Overview of IEEE 802.11b Security." In Intel Technology Journal, 2000 [cited 24 April 2001]. http://developer.intel.com/technology/itj/q22000/pdf/art_5.pdf.

Weil, N. "Wireless Security Flawed, Researchers Report." In PC World, 2001 [cited 30 April 2001]. http://www.pcworld.com/news/article/0,aid,40442,00.asp.

Weisman, R. "Internet Balancing Act: Law Enforcement v. Privacy." 2001 [cited 17 December 2001]. http://www.crmdaily.com/perl/printer/13088.

"Why 802.11b Should Stay Indoors." Cited April 24, 2001. http://wavewireless.com/classroom/whitepapers/802PROBLEMS.pdf.

"Wireless Communications and Public Safety Act of 1999." The U.S. Senator Conrad Burns Web site [cited 17 December 2001]. http://www.senate.gov/~burns/burns911.htm.

Wreden, N. "Wireless Overcomes Security Woes." In Information Week, 2000 [cited 30 April 2001]. http://www.informationweek.com/798/prwireless.htm.

Young, D. "Carriers and CALEA: Precarious Positioning." 2001 [cited 18 December 2001]. http://industryclick.com//magazinearticle.asp?magazinearticleid=134253.

Zhang, Y, and W. Lee. "Intrusion Detection in Wireless Ad-Hoc Networks." Proceedings of the ACM/IEEE MobiCom 2000, August 2000.

 



Wireless Security and Privacy(c) Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques
ISBN: 0201760347
EAN: 2147483647
Year: 2002
Pages: 73

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net