-
1
-
-
50049097122
-
-
Technical specifications
-
Bluetooth SIG, Bluetooth specifications 1.0 - 2.1+EDR. Technical specifications, 1999-2007. http://www.bluetooth.com
-
(1999)
Bluetooth specifications 1.0 - 2.1+EDR
-
-
-
2
-
-
48749133232
-
-
Press release, Nov. 14, 2006
-
Bluetooth SIG, Bluetooth Technology in Hands of One Billion. Press release, Nov. 14, 2006. http://www.bluetooth.com/Bluetooth/SIG/Billion.htm
-
Bluetooth Technology in Hands of One Billion
-
-
-
5
-
-
50649103098
-
-
Bluetooth security & Bluetooth hackers community blog, Bluetooth Sniffing For Less. Homepage, 2007. http://bluetoothsecurity.wordpress.com/ 2007/05/12/bluetooth-sniffing-for-less
-
Bluetooth security & Bluetooth hackers community blog, Bluetooth Sniffing For Less. Homepage, 2007. http://bluetoothsecurity.wordpress.com/ 2007/05/12/bluetooth-sniffing-for-less
-
-
-
-
8
-
-
85084164108
-
BlueSniff - Eve meets Alice and Bluetooth
-
Boston, MA, August 6
-
D. Spill, A. Bittau, BlueSniff - Eve meets Alice and Bluetooth. Proceedings of the First USENIX Workshop on Offensive Technologies (WOOT'2007), Boston, MA, August 6, 2007.
-
(2007)
Proceedings of the First USENIX Workshop on Offensive Technologies (WOOT'2007)
-
-
Spill, D.1
Bittau, A.2
-
9
-
-
50649102382
-
-
University College London
-
D. Spill, A. Bittau, BlueSniff. University College London, 2007. http://www.cs.ucl.ac.uk/staff/a.bittau/gr-bluetooth.tar.gz
-
(2007)
BlueSniff
-
-
Spill, D.1
Bittau, A.2
-
10
-
-
84935078039
-
Security weaknesses in Bluetooth
-
Springer-Verlag
-
M. Jakobsson, S. Wetzel, Security weaknesses in Bluetooth. LNCS, Vol. 2020, pp. 176-191, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2020
, pp. 176-191
-
-
Jakobsson, M.1
Wetzel, S.2
-
11
-
-
31344471100
-
Man in the middle attacks on Bluetooth
-
Financial Cryptography, Springer-Verlag
-
D. Kügler, Man in the middle attacks on Bluetooth. Financial Cryptography, LNCS, vol. 2742, pp. 149-161, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2742
, pp. 149-161
-
-
Kügler, D.1
-
12
-
-
35048863385
-
Relay Attacks on Bluetooth Authentication and Solutions
-
Turkey
-
A. Levi, E. Cetintas, M. Aydos, C. Koc, M. Caglayan, Relay Attacks on Bluetooth Authentication and Solutions. Computer and Information Sciences (ISCIS'2004), 19th International Symposium, Kemer-Antalya, Turkey, 2004.
-
(2004)
Computer and Information Sciences (ISCIS'2004), 19th International Symposium, Kemer-Antalya
-
-
Levi, A.1
Cetintas, E.2
Aydos, M.3
Koc, C.4
Caglayan, M.5
-
13
-
-
38149097247
-
Security Associations in Personal Networks - A Comparative Analysis
-
NRC-TR-2007-004, 2007
-
J. Suomalainen, J. Valkonen, N. Asokan, Security Associations in Personal Networks - A Comparative Analysis. Nokia Research Center Technical Report NRC-TR-2007-004, 2007. http://www.springerlink.com/content/ dk04356586jg4g00/fulltext.pdf
-
Nokia Research Center Technical Report
-
-
Suomalainen, J.1
Valkonen, J.2
Asokan, N.3
-
14
-
-
48749083665
-
Niño
-
Tashkent, Uzbekistan, September 26-28
-
K. Hyppönen, K. Haataja, "Niño" Man-In-The-Middle Attack on Bluetooth Secure Simple Pairing. Proceedings of the IEEE Third International Conference in Central Asia on Internet, The Next Generation of Mobile, Wireless and Optical Communications Networks (ICI'2007), Tashkent, Uzbekistan, September 26-28, 2007.
-
(2007)
Man-In-The-Middle Attack on Bluetooth Secure Simple Pairing. Proceedings of the IEEE Third International Conference in Central Asia on Internet, The Next Generation of Mobile, Wireless and Optical Communications Networks (ICI'2007)
-
-
Hyppönen, K.1
Haataja, K.2
-
16
-
-
62649095696
-
New Practical Attack Against Bluetooth Security Using Efficient Implementations of Security Analysis Tools
-
Berkeley, California, USA, September 24-26
-
K. Haataja, New Practical Attack Against Bluetooth Security Using Efficient Implementations of Security Analysis Tools. Proceedings of the IASTED International Conference on Communication, Network and Information Security (CNIS'2007), Berkeley, California, USA, September 24-26, 2007.
-
(2007)
Proceedings of the IASTED International Conference on Communication, Network and Information Security (CNIS'2007)
-
-
Haataja, K.1
|