-
2
-
-
34247392019
-
-
Bluetags Corporation
-
Bluetags Corporation. http://www.bluetags.com.
-
-
-
-
3
-
-
34247396655
-
-
Bluetooth Special Interest Group
-
Bluetooth Special Interest Group. http://www.bluetooth.com/.
-
-
-
-
9
-
-
0002434672
-
Bluetooth: Visions, Goals and Architecture
-
J. Haartsen, M. Naghshineh, J. Inouye, O. Joeressen, and W. Allen. Bluetooth: Visions, Goals and Architecture. In ACM Mobile Computing and Communications Review, pages 38-45, 1998.
-
(1998)
ACM Mobile Computing and Communications Review
, pp. 38-45
-
-
Haartsen, J.1
Naghshineh, M.2
Inouye, J.3
Joeressen, O.4
Allen, W.5
-
10
-
-
34247333484
-
The Ephemeral Pairing Problem
-
Financial Cryptography, Springer-Verlag
-
J. H. Hoepman. The Ephemeral Pairing Problem. In Financial Cryptography, Lecture Notes in Computer Science, LNCS 3110, pages 212-226. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science, LNCS
, vol.3110
, pp. 212-226
-
-
Hoepman, J.H.1
-
11
-
-
24644472550
-
Ephemeral Pairing on Anonymous Networks
-
Proceedings of the Second International Conference on Security in Pervasive Computing SPC 05, Springer-Verlag
-
J. H. Hoepman. Ephemeral Pairing on Anonymous Networks. In Proceedings of the Second International Conference on Security in Pervasive Computing (SPC 05), Lecture Notes in Computer Science, LNCS 3450, pages 101-116. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science, LNCS
, vol.3450
, pp. 101-116
-
-
Hoepman, J.H.1
-
13
-
-
34247323573
-
-
Infrared Data Association
-
Infrared Data Association. http://www.irda.org/.
-
-
-
-
14
-
-
84935078039
-
Security Weaknesses in Bluetooth
-
Proceedings of the Cryptographer's Track at the RSA Conference CT-RSA '01, Springer-Verlag
-
M. Jakobsson and S. Wetzel. Security Weaknesses in Bluetooth. In Proceedings of the Cryptographer's Track at the RSA Conference (CT-RSA '01), Lecture Notes in Computer Science, LNCS 2020, pages 176-191. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science, LNCS
, vol.2020
, pp. 176-191
-
-
Jakobsson, M.1
Wetzel, S.2
-
15
-
-
34247388933
-
-
Loca Project
-
Loca Project. http://www.loca-lab.org.
-
-
-
-
16
-
-
67651053584
-
Pseudonym Systems
-
Proceedings of the 6th Annual International Workshop of Selected Areas in Cryptography SAC '99, Springer-Verlag
-
A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf. Pseudonym Systems. In Proceedings of the 6th Annual International Workshop of Selected Areas in Cryptography (SAC '99), Lecture Notes in Computer Science, LNCS 1758, pages 184-199. Springer-Verlag, 1999.
-
(1758)
Lecture Notes in Computer Science, LNCS
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.2
Sahai, A.3
Wolf, S.4
-
19
-
-
34247374409
-
-
New European Schemes for Signatures
-
New European Schemes for Signatures, Integrity, and Encryption. http://www.cryptonessie.org.
-
Integrity, and Encryption
-
-
-
20
-
-
1542269608
-
Analyzing the Energy Consumption of Security Protocols
-
ACM Press
-
N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha. Analyzing the Energy Consumption of Security Protocols. In Proceedings of the 2009 International Symposium on Low Power Electronics and Design (ISLPED '03), pages 30-35. ACM Press, 2003.
-
(2003)
Proceedings of the 2009 International Symposium on Low Power Electronics and Design (ISLPED '03)
, pp. 30-35
-
-
Potlapally, N.1
Ravi, S.2
Raghunathan, A.3
Jha, N.4
-
21
-
-
85020598353
-
Identity-Based Cryptosystems and Signature Schemes
-
Advances in Cryptology, CRYPTO '84, Springer-Verlag
-
A. Shamir. Identity-Based Cryptosystems and Signature Schemes. In Advances in Cryptology - CRYPTO '84, Lecture Notes in Computer Science, LNCS 196, pages 47-53. Springer-Verlag, 1984.
-
(1984)
Lecture Notes in Computer Science, LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
23
-
-
34247394276
-
Review of the Bluetooth Security Architecture
-
D. Singelée and B. Preneel. Review of the Bluetooth Security Architecture. Information Security Bulletin, 11(2):45-53, 2006.
-
(2006)
Information Security Bulletin
, vol.11
, Issue.2
, pp. 45-53
-
-
Singelée, D.1
Preneel, B.2
-
24
-
-
84947251443
-
The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks
-
Proceedings of the 7th International Workshop on Security Protocols, Springer-Verlag
-
F. Stajano and R. Anderson. The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks. In Proceedings of the 7th International Workshop on Security Protocols, Lecture Notes in Computer Science, LNCS 1796, pages 172-182. Springer-Verlag, 1999.
-
(1796)
Lecture Notes in Computer Science, LNCS
, pp. 172-182
-
-
Stajano, F.1
Anderson, R.2
-
26
-
-
33745744414
-
Location Privacy in Bluetooth
-
Proceedings of 2nd European Workshop on Security and Privacy in Ad hoc and Sensor Networks ESAS '05, Springer-Verlag
-
F. Wong and F. Stajano. Location Privacy in Bluetooth. In Proceedings of 2nd European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS '05), Lecture Notes in Computer Science, LNCS 3813, pages 176-188. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science, LNCS
, vol.3813
, pp. 176-188
-
-
Wong, F.1
Stajano, F.2
|