메뉴 건너뛰기




Volumn 2742, Issue , 2003, Pages 149-161

"Man in the middle" attacks on bluetooth

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; BLUETOOTH; FREQUENCY HOPPING; MOBILE DEVICES; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 31344471100     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45126-6_11     Document Type: Article
Times cited : (50)

References (7)
  • 2
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols against dictionary attacks
    • IEEE Computer Society Press
    • Steven M. Bellovin and Michael Merrit. Encrypted key exchange: Password-based protocols against dictionary attacks. In IEEE Symposium on Research in Security and Privacy, pages 72-84. IEEE Computer Society Press, 1992.
    • (1992) IEEE Symposium on Research in Security and Privacy , pp. 72-84
    • Bellovin, S.M.1    Merrit, M.2
  • 3
    • 84949226395 scopus 로고    scopus 로고
    • Analysis of the E0 encryption system
    • Selected Areas in Cryptography - SAC 2001, Springer-Verlag
    • Scott R. Fluhrer and Stefan Lucks. Analysis of the E0 encryption system. In Selected Areas in Cryptography - SAC 2001, Lecture Notes in Computer Science 2259, pages 38-48. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2259 , pp. 38-48
    • Fluhrer, S.R.1    Lucks, S.2
  • 5
    • 84935078039 scopus 로고    scopus 로고
    • Security weaknesses in Bluetooth
    • Progress in Cryptography - CT-RSA 2001, Springer-Verlag
    • Markus Jakobsson and Susanne Wetzel. Security weaknesses in Bluetooth. In Progress in Cryptography - CT-RSA 2001, Lecture Notes in Computer Science 2020, pages 176-191. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2020 , pp. 176-191
    • Jakobsson, M.1    Wetzel, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.