NIST logo

Publications Portal

You searched on:
Topic Area: Telcommunications/Wireless

Displaying records 61 to 70 of 84 records.
Resort by: Date / Title


61. Predictive Handover Mechanism based on Required Time Estimation in Heterogeneous Wireless Networks
Topic: Telcommunications/Wireless
Published: 11/17/2008
Authors: Sang J. Yoo, David E Cypher, Nada T Golmie
Abstract: In most conventional layer 2 triggering approaches, a pre-defined threshold for a specific perspective such as the received signal strength is used. This may cause too late or too early handover executions. In this paper we propose a new predictive h ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51262

62. Using the EAP Framework for Fast Media Independent Handover Authentication
Topic: Telcommunications/Wireless
Published: 11/17/2008
Authors: Antonio Izquierdo Manzanares, Nada T Golmie, Katrin Hoeper, Lidong Chen
Abstract: In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover, namely, re-authentication and pre-authentication.  We provide a detailed analysis of each mechanis ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152094

63. Guidelines on Cell Phone and PDA Security
Series: Special Publication (NIST SP)
Report Number: 800-124
Topic: Telcommunications/Wireless
Published: 11/3/2008
Authors: Wayne Jansen, Karen Ann Scarfone
Abstract: Cell phones and personal digital assistants (PDAs) have become indispensable tools for today's highly mobile workforce. Small and relatively inexpensive, these devices can be used for many functions, including sending and receiving electronic mail, s ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890048

64. Guide to Bluetooth Security
Series: Special Publication (NIST SP)
Report Number: 800-121
Topic: Telcommunications/Wireless
Published: 9/30/2008
Authors: Karen Ann Scarfone, John Padgette
Abstract: Bluetooth is an open standard for short-range radio frequency communication. Bluetooth technology is used primarily to establish wireless personal area networks. It has been integrated into many types of business and consumer devices, including cel ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890066

65. Forensic Filtering of Cell Phone Protocols
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7516
Topic: Telcommunications/Wireless
Published: 8/27/2008
Authors: Aurelien Michel Dominique Delaitre, Wayne Jansen
Abstract: Phone managers are non-forensic software tools designed to carry out a range of tasks for the user, such as reading and updating the contents of a phone, using one or more of the communications protocols supported by the phone. Phone managers are so ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890047

66. Security for Private Branch Exchange Systems
Series: ITL Bulletin
Topic: Telcommunications/Wireless
Published: 4/30/2008
Author: David R Kuhn
Abstract: This document provides an introduction to security for private branch exchange systems (PBXs). The primary audience is agency system administrators and others responsible for the installation and operation of PBX systems. Major threat classes are e ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151230

67. Quantize-and-Forward Relaying with M-ary Phase Shift Keying
Topic: Telcommunications/Wireless
Published: 3/31/2008
Authors: Michael R Souryal, Huiqing You
Abstract: Using cooperative transmission, two or more single-antenna users can share their antennas to achieve spatial diversity in a slow fading channel. One relaying protocol that achieves diversity, amplify-and-forward (AF), is striking in its simplicity, b ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51311

68. Guide to Storage Encryption Technologies for End User Devices
Series: Special Publication (NIST SP)
Report Number: 800-111
Topic: Telcommunications/Wireless
Published: 11/15/2007
Authors: Karen Ann Scarfone, Murugiah P Souppaya, Matt Sexton
Abstract: Many threats against end user devices, such as desktop and laptop computers, smart phones, personal digital assistants, and removable media, could cause information stored on the devices to be accessed by unauthorized parties. To prevent such disclos ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51257

69. Guidelines on Cell Phone Forensics
Series: Special Publication (NIST SP)
Report Number: 800-101
Topic: Telcommunications/Wireless
Published: 5/30/2007
Authors: Wayne Jansen, Richard P Ayers
Abstract: Forensic specialists periodically encounter unusual devices and new technologies outside of traditional computer forensics. Cell phones are an emerging area with such characteristics. The objective of this guide is twofold: to help organizations evol ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51152

70. Securing Radio Frequency Identification (RFID) Systems
Series: ITL Bulletin
Topic: Telcommunications/Wireless
Published: 5/17/2007
Author: Karen Ann Scarfone
Abstract: Radio frequency identification (RFID) is a form of automatic identification and data capture technology that uses electric or magnetic fields at radio frequencies to transmit information. An RFID system can be used to identify many types of objects, ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51183



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series