|
A C implementation of elliptic-curve-based DAA project. https://github.com/ xaptum/ecdaa. FreeRADIUS: The world’s most popular RADIUS Server. https://freeradius.org. How the NSA is tracking people right now. http://apps.washingtonpost.com/g/page/national/how-the-nsa-is-tracking-people-right-now/634/. If You Have a Smart Phone, Anyone Can Now Track Your Every Move. https://www.technologyreview.com/2012/04/20/19824/ if-you-have-a-smart-phone-anyone-can-now-track-your-every-move/. No, this isn’t a scene from Minority Report. This trash can is stalk- ing you. https://arstechnica.com/information-technology/2013/08/ no-this-isnt-a-scene-from-minority-report-this-trash-can-is-stalking-you/. Ieee standard for information technology– local and metropolitan area networks– specific requirements– part 11: Wireless lan medium access control (mac) and phys- ical layer (phy) specifications amendment 2: Fast basic service set (bss) transition. IEEE Std 802.11r-2008 (Amendment to IEEE Std 802.11-2007 as amended by IEEE Std 802.11k-2008), pages 1–126, 2008. J.Camenisch,M.Drijvers,andA.Lehmann.UniversallyComposableDirectAnony- mous Attestationy. In Public-Key Cryptography – PKC 2016, 2016. D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. RFC 5280 (Proposed Standard). M. Gruteser and D. Grunwald. Enhancing location privacy in wireless lan through disposable interface identifiers: A quantitative analysis. volume 10, pages 46–55, 01 2003. R. Housley, T. Polk, D. W. S. Ford, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280, 2002. D. Inoue, R. Nomura, and M. Kuroda. Transient mac address scheme for untraceability and dos attack resiliency on wireless network. In Symposium, 2005 Wireless Telecommunications, pages 15–23, 2005. T. Jiang, H. J. Wang, and Y.-C. Hu. Preserving location privacy in wireless lans. In Proceedings of the 5th international conference on Mobile systems, applications and services, pages 246–257, 2007. M. Lei, X. Hong, and S. V. Vrbsky. Protecting location privacy with dynamic mac address exchanging in wireless networks. In IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference, pages 49–53, 2007. J.Martin,T.Mayberry,C.Donahue,L.Foppe,L.Brown,C.Riggins,E.C.Rye,and D. Brown. A study of mac address randomization in mobile devices and when it fails. Proceedings on Privacy Enhancing Technologies, 2017(4):365–383, 2017. Qi He, Dapeng Wu, and P. Khosla. The quest for personal control over mobile loca- tion privacy. IEEE Communications Magazine, 42(5):130–136, 2004. M.Vanhoef,C.Matte,M.Cunche,L.S.Cardoso,andF.Piessens.Whymacaddress randomization is not enough: An analysis of wi-fi network discovery mechanisms. In AsiaCCS, pages 413–424. ACM, 2016.
|