NIST logo

Publications Portal

You searched on:
Topic Area: Telcommunications/Wireless

Displaying records 71 to 80 of 86 records.
Resort by: Date / Title


71. Guidelines on Cell Phone Forensics
Series: Special Publication (NIST SP)
Report Number: 800-101
Topic: Telcommunications/Wireless
Published: 5/30/2007
Authors: Wayne Jansen, Richard P Ayers
Abstract: [Superseded by SP 800-101 Rev. 1 (May 2014): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915021] Forensic specialists periodically encounter unusual devices and new technologies outside of traditional computer forensics. Cell phones ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51152

72. Securing Radio Frequency Identification (RFID) Systems
Series: ITL Bulletin
Topic: Telcommunications/Wireless
Published: 5/17/2007
Author: Karen Ann Scarfone
Abstract: Radio frequency identification (RFID) is a form of automatic identification and data capture technology that uses electric or magnetic fields at radio frequencies to transmit information. An RFID system can be used to identify many types of objects, ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51183

73. Cell Phone Forensic Tools: An Overview and Analysis Update
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7387
Topic: Telcommunications/Wireless
Published: 3/21/2007
Authors: Richard P Ayers, Wayne Jansen, Aurelien Michel Dominique Delaitre, Ludovic Moenner
Abstract: Cell phones and other handheld devices incorporating cell phone capabilities (e.g., Personal Digital Assistant (PDA) phones) are ubiquitous. Rather than just placing calls, certain phones allow users to perform additional tasks such as SMS (Short Mes ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51100

74. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
Series: Special Publication (NIST SP)
Report Number: 800-97
Topic: Telcommunications/Wireless
Published: 2/7/2007
Authors: Sheila E Frankel, Bernard Eydt, L Owens, Karen Kent Scarfone
Abstract: This report provides readers with a detailed explanation of next generation 802.11 wireless security. It describes the inherently flawed Wired Equivalent Privacy (WEP) and explains 802.11i's two-step approach (interim and long-term)to providing effec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50897

75. Performance of Amplify-and-Forward and Decode-and-Forward Relaying in Rayleigh Fading With Turbo Codes
Topic: Telcommunications/Wireless
Published: 5/1/2006
Authors: Michael R Souryal, B R Vojcic
Abstract: Cooperative transmission, in which a source and relay cooperate to send a message to a destination, can provide spatial diversity against fading in wireless networks. We derive analytical expressions for the error probability of amplify-and-forward ( ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151153

76. Security Considerations for Voice Over IP Systems
Series: Special Publication (NIST SP)
Report Number: 800-58
Topic: Telcommunications/Wireless
Published: 1/1/2005
Authors: David R Kuhn, Thomas J. Walsh, S G Fries
Abstract: Voice over Internet Protocol (VOIP) refers to the transmission of speech across data-style networks. This form of transmission is conceptually superior to conventional circuit switched communication in many ways. However, a plethora of security issue ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150222

77. The GMPLS Control Plane Architecture for Optical Networks
Topic: Telcommunications/Wireless
Published: 1/1/2005
Author: David Wesley Griffith
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151128

78. Guidelines on PDA Forensics, Recommendations of the National Institute of Standards and Technology
Series: Special Publication (NIST SP)
Report Number: 800-72
Topic: Telcommunications/Wireless
Published: 11/1/2004
Authors: Wayne Jansen, Richard P Ayers
Abstract: Forensic specialists periodically encounter unusual devices and new technologies normally not envisaged as having immediate relevance from a digital forensics perspective. The objective of the guide is twofold: to help organizations evolve appropria ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150217

79. Securing Voice Over Internet Protocol (IP) Networks
Series: ITL Bulletin
Topic: Telcommunications/Wireless
Published: 10/1/2004
Authors: Thomas J. Walsh, David R Kuhn
Abstract: Voice over IP - the transmission of voice over traditional packet-switched IP networks - is one of the hottest trends in telecommunications. As with any new technology, VOIP introduces both opportunities and problems. Lower cost and greater flexibil ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150236

80. Security for Wireless Networks and Devices
Series: ITL Bulletin
Topic: Telcommunications/Wireless
Published: 3/27/2003
Author: Shirley M. Radack
Abstract: This ITL Bulletin summarizes NIST Special Publication (SP) 800-48, Wireless Network Security, 802.11, Bluetooth, and Handheld Devices. Written by Tom Karygiannis and Les Owens. NIST SP 800-48 provides recommendations to improve the security of wirele ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151280



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series