Back to Results
First PageMeta Content
Wireless networking / Cryptography / Technology / IEEE 802.11 / Wireless security / EAP-SIM / Extensible Authentication Protocol / Wi-Fi Protected Access / Wireless LAN / Cryptographic protocols / Computer network security / Computing


Report on DIMACS∗ Workshop on Mobile and Wireless Security Date of Workshop: November 3 - 4, 2004
Add to Reading List

Document Date: 2005-05-10 10:32:50


Open Document

File Size: 100,87 KB

Share Result on Facebook

Company

IBM / AT&T Labs / Bell Labs / Avaya Labs / Nokia / Ericsson / Telcordia Technologies / CTO Mobile-Mind Inc. / Nidal Aboudagga UCL Crypto Group / Needham / HP Labs / NEC Laboratories America / DoCoMo USA Labs / Intel / Microsoft / /

Event

Business Partnership / FDA Phase / /

Facility

Princeton University / Yuan Yuan Computer Science Department University of Maryland / Stevens Institute of Technology / College Park Date / Rutgers University / University of Maryland Dr. Arbaugh / Bill Arbaugh Computer Science Department University of Maryland / /

IndustryTerm

wireless public network / inter-networking / authentication server / router certification protocol / Wireless network access / Wireless Localization / Wireless Network / wireless standards / Wireless Security Date / cellular telephony realms / wireless roaming / wireless networks / authorization solutions / potential applications / cryptographic protocols / subscriber network / access network / multi-party systems / statistical estimation algorithms / wireless technologies / Wireless Authentication Overview / Web page login / localization algorithms / public wireless networks / wireless network security / wireless device / cryptographic services / wireless cellular network / mobile ad hoc networks / wireless security domain / well-defined key usage protocol / wireless network access schemes / Internet authentication / authenticated non-telephony m-commerce applications / Wireless Security / multimedia applications / /

Organization

University of Maryland / National Science Foundation / Rutgers University / Boston College / Princeton University / Stevens Institute of Technology / University of Maryland / College Park / Yuan Yuan Computer Science Department University / DIMACS Center / Bill Arbaugh Computer Science Department University / /

Person

Arrko / Bill Arbaugh / James Kempf / William Arbaugh / Brenda Latka / Jesse Walker / Jari Arkko / Wade Trappe / Fred S. Roberts / Mary J. Cronin / Scott Guthery / Anne-Sophie Duserre / Pasi Eronen / /

Position

Securing Wireless Localization Speaker / Network Access Speaker / Acknowledgment The author / Director of DIMACS / Covert Channels Speaker / Wireless Network Security Speaker / Roaming Overview Speaker / author / broker / etc / Report Author / Infrastructure Speaker / Keying Requirements Speaker / Authorization Architecture Speaker / Wireless Authentication Overview Speaker / /

Product

RC4 / /

ProvinceOrState

Maryland / /

Technology

home network / RC4 algorithm / statistical estimation algorithms / WEP / Public Key Infrastructure / broadband / PKI / well-defined key usage protocol / localization algorithms / secret key / Wi-Fi / Encryption / cryptography / two-party protocols / public key / IETF SEND router certification protocol / WLAN / wireless device / HTTP / wireless technologies / caching / GSM / 3G / wireless LAN / /

SocialTag