next up previous
Next: About this document ... Up: Security Analysis of Handhelds Previous: Acknowledgements

Bibliography

And01a
Mike Bond; Ross Anderson.
API-Level attacks on embedded systems.
2001.

And01b
Ross Anderson.
Protecting embedded systems- the next ten years.
In CHES 2001, LNCS 2162, 2001.

And01c
Ross Anderson.
Security Engineering.
Wiley Computer Publishing, 2001.

AW01
Sheueling Chang Shantz Andre Weimerskirch, Christ Paar.
Elliptic curve cryptography on a palm os device.
In ACISP 2001, LNCS 2119, 2001.

Bur92
Butler Lampson; Martin Abadi;Michael Burrows.
Authentication in distributed systems: Theory and pratice.
ACM Trans. Computer Systems, 1992.

Lam71
Butler Lampson.
Protection.
In Proc. 5th Princeton Conf. On Information Sciences and Systems, 1971.

Lam00
Butler Lampson.
Computer security in real world.
2000.

Mud01
Kingpin; Mudge.
Security analysis of the palm os and its weaknesses against malicious code threats.
In Proceedings of the 10th USENIX Security Symposium, 2001.

Res01
Microsoft Research.
Pocket pc security.
Microsoft White Papers, 2001.

sima
Information markup language 0.01 specification.
www.simputer.org.

simb
Simputer, IML and smartcard.
www.simputer.org.



Vaibhav Bhandari 2001-11-29