402 Smart Phone and Next-Generation Mobile Computing
EEF DES Cracker, http://www.eff.org/Privacy/Crypto/Crypto_misc/
DESCracker/.
For a list of practical ways to protect a Wi-Fi network, see
http://www.wi-fi.org/OpenSection/secure.asp?TID=2 (the site
also introduces WPA2, a Wi-Fi certified security solution based
on 802.11i).
IEEE AAA Working Group, http://www.ietf.org/html.charters/aaa-
charter.html.
IETF Geographic Location/Privacy Working Group, http://www.ietf
.org/html.charters/geopriv-charter.html; Geopriv Requirement,
http://www.ietf.org/rfc/rfc3693.txt.
IETF Internet Key Exchange, http://www.ietf.org/rfc/rfc2409.txt.
IETF IPSec Working Group, http://www.ietf.org/html.charters/ipsec-
charter.html.
IETF PKI (X.509) Working Group, http://www.ietf.org/html.charters/ ...