메뉴 건너뛰기




Volumn 4104 LNCS, Issue , 2006, Pages 252-265

Improved pairing protocol for bluetooth

Author keywords

Bluetooth; Pairing; Security

Indexed keywords

COMPUTER HARDWARE; DATA PRIVACY; NETWORK PROTOCOLS; PROBLEM SOLVING; RADIO TRANSMISSION; SECURITY OF DATA; SPAMMING;

EID: 33749614144     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11814764_21     Document Type: Conference Paper
Times cited : (7)

References (30)
  • 1
    • 84941154833 scopus 로고    scopus 로고
    • Bluetooth Special Interest Group, http://www.bluetooth.com/.
  • 2
    • 84941150399 scopus 로고    scopus 로고
    • IEEE 802.15, the Wireless Personal Area Network Working Group
    • IEEE 802.15, the Wireless Personal Area Network Working Group, http://www.ieee802.org/15/.
  • 14
    • 35248820612 scopus 로고    scopus 로고
    • Algebraic attacks on stream ciphers with linear feedback
    • Lecture Notes in Computer Science, LNCS 2656. Springer-Verlag
    • N. Courtois and W. Meier. Algebraic Attacks on Stream Ciphers with Linear Feedback. In Advances in Cryptology - EUROCRYPT 2003, Lecture Notes in Computer Science, LNCS 2656, pages 345-359. Springer-Verlag, 2003.
    • (2003) Advances in Cryptology - EUROCRYPT 2003 , pp. 345-359
    • Courtois, N.1    Meier, W.2
  • 16
    • 84947279371 scopus 로고    scopus 로고
    • Linear cryptanalysis of bluetooth stream cipher
    • Lecture Notes in Computer Science, LNCS 2332. Springer-Verlag
    • J. Golic, V. Bagini, and G. Morgari. Linear Cryptanalysis of Bluetooth Stream Cipher. In Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Computer Science, LNCS 2332, pages 238-255. Springer-Verlag, 2002.
    • (2002) Advances in Cryptology - EUROCRYPT 2002 , pp. 238-255
    • Golic, J.1    Bagini, V.2    Morgari, G.3
  • 19
    • 33745130425 scopus 로고    scopus 로고
    • The conditional correlation attack: A practical attack on bluetooth encryption
    • Lecture Notes in Computer Science, LNCS 3621. Springer-Verlag
    • Y. Lu, W. Meier, and S. Vaudenay. The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption. In Advances in Cryptology - CRYPTO 2005, Lecture Notes in Computer Science, LNCS 3621, pages 97-117. Springer-Verlag, 2005.
    • (2005) Advances in Cryptology - CRYPTO 2005 , pp. 97-117
    • Lu, Y.1    Meier, W.2    Vaudenay, S.3
  • 20
    • 34247333484 scopus 로고    scopus 로고
    • The ephemeral pairing problem
    • Lecture Notes in Computer Science, LNCS 3110. Springer-Verlag
    • J. H. Hoepman. The Ephemeral Pairing Problem. In Financial Cryptography, Lecture Notes in Computer Science, LNCS 3110, pages 212-226. Springer-Verlag, 2004.
    • (2004) Financial Cryptography , pp. 212-226
    • Hoepman, J.H.1
  • 23
    • 24644434353 scopus 로고    scopus 로고
    • Security in personal area networks
    • . IEEE
    • C. Gehrmann and K. Nyberg. Security in Personal Area Networks. In Security for Mobility, pages 191-230. IEEE, 2004.
    • (2004) Security for Mobility , pp. 191-230
    • Gehrmann, C.1    Nyberg, K.2
  • 24
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • C. Gehrmann, C. Mitchell, and K. Nyberg. Manual Authentication for Wireless Devices. RSA Cryptobytes, 7(1):29-37, 2004.
    • (2004) RSA Cryptobytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.2    Nyberg, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.