-
1
-
-
84941154833
-
-
Bluetooth Special Interest Group, http://www.bluetooth.com/.
-
-
-
-
2
-
-
84941150399
-
-
IEEE 802.15, the Wireless Personal Area Network Working Group
-
IEEE 802.15, the Wireless Personal Area Network Working Group, http://www.ieee802.org/15/.
-
-
-
-
3
-
-
0002434672
-
Bluetooth: Visions, goals and architecture
-
J. Haartsen, M. Naghshineh, J. Inouye, O. Joeressen, and W. Allen. Bluetooth: Visions, Goals and Architecture. In ACM Mobile Computing and Communications Review, pages 38-45, 1998.
-
(1998)
ACM Mobile Computing and Communications Review
, pp. 38-45
-
-
Haartsen, J.1
Naghshineh, M.2
Inouye, J.3
Joeressen, O.4
Allen, W.5
-
5
-
-
33749585712
-
Security attacks against bluetooth wireless networks
-
U.S. Military Academy, West Point, NY, June
-
G. Lamm, G. Falauto, J. Estrada, and J. Gadiyaram. Security Attacks against Bluetooth Wireless Networks. In Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, pages 265-272. U.S. Military Academy, West Point, NY, June 2001.
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
, pp. 265-272
-
-
Lamm, G.1
Falauto, G.2
Estrada, J.3
Gadiyaram, J.4
-
10
-
-
77953838402
-
Cracking the bluetooth PIN
-
ACM, June
-
Y. Shaked and A. Wool. Cracking the Bluetooth PIN. In Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services (MobiSys '05), pages 39-50. ACM, June 2005.
-
(2005)
Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services (MobiSys '05)
, pp. 39-50
-
-
Shaked, Y.1
Wool, A.2
-
14
-
-
35248820612
-
Algebraic attacks on stream ciphers with linear feedback
-
Lecture Notes in Computer Science, LNCS 2656. Springer-Verlag
-
N. Courtois and W. Meier. Algebraic Attacks on Stream Ciphers with Linear Feedback. In Advances in Cryptology - EUROCRYPT 2003, Lecture Notes in Computer Science, LNCS 2656, pages 345-359. Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology - EUROCRYPT 2003
, pp. 345-359
-
-
Courtois, N.1
Meier, W.2
-
16
-
-
84947279371
-
Linear cryptanalysis of bluetooth stream cipher
-
Lecture Notes in Computer Science, LNCS 2332. Springer-Verlag
-
J. Golic, V. Bagini, and G. Morgari. Linear Cryptanalysis of Bluetooth Stream Cipher. In Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Computer Science, LNCS 2332, pages 238-255. Springer-Verlag, 2002.
-
(2002)
Advances in Cryptology - EUROCRYPT 2002
, pp. 238-255
-
-
Golic, J.1
Bagini, V.2
Morgari, G.3
-
19
-
-
33745130425
-
The conditional correlation attack: A practical attack on bluetooth encryption
-
Lecture Notes in Computer Science, LNCS 3621. Springer-Verlag
-
Y. Lu, W. Meier, and S. Vaudenay. The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption. In Advances in Cryptology - CRYPTO 2005, Lecture Notes in Computer Science, LNCS 3621, pages 97-117. Springer-Verlag, 2005.
-
(2005)
Advances in Cryptology - CRYPTO 2005
, pp. 97-117
-
-
Lu, Y.1
Meier, W.2
Vaudenay, S.3
-
20
-
-
34247333484
-
The ephemeral pairing problem
-
Lecture Notes in Computer Science, LNCS 3110. Springer-Verlag
-
J. H. Hoepman. The Ephemeral Pairing Problem. In Financial Cryptography, Lecture Notes in Computer Science, LNCS 3110, pages 212-226. Springer-Verlag, 2004.
-
(2004)
Financial Cryptography
, pp. 212-226
-
-
Hoepman, J.H.1
-
23
-
-
24644434353
-
Security in personal area networks
-
. IEEE
-
C. Gehrmann and K. Nyberg. Security in Personal Area Networks. In Security for Mobility, pages 191-230. IEEE, 2004.
-
(2004)
Security for Mobility
, pp. 191-230
-
-
Gehrmann, C.1
Nyberg, K.2
-
24
-
-
23944521144
-
Manual authentication for wireless devices
-
C. Gehrmann, C. Mitchell, and K. Nyberg. Manual Authentication for Wireless Devices. RSA Cryptobytes, 7(1):29-37, 2004.
-
(2004)
RSA Cryptobytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.2
Nyberg, K.3
-
27
-
-
1542269608
-
Analyzing the energy consumption of security protocols
-
ACM, August
-
N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha. Analyzing the Energy Consumption of Security Protocols. In Proceedings of the 2003 International Symposium on Low Power Electronics and Design (ISLPED '03), pages 30-35. ACM, August 2003.
-
(2003)
Proceedings of the 2003 International Symposium on Low Power Electronics and Design (ISLPED '03)
, pp. 30-35
-
-
Potlapally, N.1
Ravi, S.2
Raghunathan, A.3
Jha, N.4
|