-
1
-
-
50049097122
-
-
Technical specifications
-
Bluetooth SIG, Bluetooth specifications 1.0 - 2.1+EDR. Technical specifications, 1999-2007. http://www.bluetooth.com
-
(1999)
Bluetooth specifications 1.0 - 2.1+EDR
-
-
-
2
-
-
58049122970
-
-
Bluetooth security & Bluetooth hackers community blog, Bluetooth Sniffing For Less. Homepage, 2007. http://bluetoothsecurity.wordpress.com/ 2007/05/12/bluetooth-sniffing-for-less
-
Bluetooth security & Bluetooth hackers community blog, Bluetooth Sniffing For Less. Homepage, 2007. http://bluetoothsecurity.wordpress.com/ 2007/05/12/bluetooth-sniffing-for-less
-
-
-
-
5
-
-
85084164108
-
BlueSniff - Eve meets Alice and Bluetooth
-
Boston, MA, August 6
-
D. Spill, A. Bittau, BlueSniff - Eve meets Alice and Bluetooth. Proceedings of the First USENIX Workshop on Offensive Technologies (WOOT'2007), Boston, MA, August 6, 2007.
-
(2007)
Proceedings of the First USENIX Workshop on Offensive Technologies (WOOT'2007)
-
-
Spill, D.1
Bittau, A.2
-
6
-
-
50649102382
-
-
University College London
-
D. Spill, A. Bittau, BlueSniff. University College London, 2007. http://www.cs.ucl.ac.uk/staff/a.bittau/gr-bluetooth.tar.gz
-
(2007)
BlueSniff
-
-
Spill, D.1
Bittau, A.2
-
7
-
-
84935078039
-
Security weaknesses in Bluetooth
-
Springer-Verlag
-
M. Jakobsson, S. Wetzel, Security weaknesses in Bluetooth. LNCS, Vol. 2020, pp. 176-191, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2020
, pp. 176-191
-
-
Jakobsson, M.1
Wetzel, S.2
-
8
-
-
31344471100
-
Man in the middle attacks on Bluetooth
-
Financial Cryptography, Springer-Verlag
-
D. Kügler, Man in the middle attacks on Bluetooth. Financial Cryptography, LNCS, vol. 2742, pp. 149-161, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2742
, pp. 149-161
-
-
Kügler, D.1
-
9
-
-
35048863385
-
Relay Attacks on Bluetooth Authentication and Solutions
-
Turkey
-
A. Levi, E. Cetintas, M. Aydos, C. Koc, M. Caglayan, Relay Attacks on Bluetooth Authentication and Solutions. Computer and Information Sciences (ISCIS'2004), 19th International Symposium, Kemer-Antalya, Turkey, 2004.
-
(2004)
Computer and Information Sciences (ISCIS'2004), 19th International Symposium, Kemer-Antalya
-
-
Levi, A.1
Cetintas, E.2
Aydos, M.3
Koc, C.4
Caglayan, M.5
-
11
-
-
48749083665
-
Niño Man-In-The-Middle Attack on Bluetooth Secure Simple Pairing
-
Tashkent, Uzbekistan, September 26-28
-
K. Hyppönen, K. Haataja, "Niño" Man-In-The-Middle Attack on Bluetooth Secure Simple Pairing. Proceedings of the IEEE Third International Conference in Central Asia on Internet, The Next Generation of Mobile, Wireless and Optical Communications Networks (ICI'2007), Tashkent, Uzbekistan, September 26-28, 2007.
-
(2007)
Proceedings of the IEEE Third International Conference in Central Asia on Internet, The Next Generation of Mobile, Wireless and Optical Communications Networks (ICI'2007)
-
-
Hyppönen, K.1
Haataja, K.2
-
12
-
-
50649091323
-
Man-In-The-Middle Attacks on Bluetooth: A Comparative Analysis, a Novel Attack, and Countermeasures
-
Julians, Malta, March 12-14
-
K. Haataja, K. Hyppönen, Man-In-The-Middle Attacks on Bluetooth: a Comparative Analysis, a Novel Attack, and Countermeasures. Proceedings of the IEEE Third International Symposium on Communications, Control and Signal Processing (ISCCSP'2008), St. Julians, Malta, March 12-14, 2008.
-
(2008)
Proceedings of the IEEE Third International Symposium on Communications, Control and Signal Processing (ISCCSP'2008), St
-
-
Haataja, K.1
Hyppönen, K.2
-
13
-
-
50049124688
-
-
EE Times Online, newscopy, September 1
-
J. Shandle, University research aims at more secure Wi-Fi. EE Times Online, newscopy, September 1, 2006. http://www.eetimes.com/news/latest/ showArticle.jhtml?articleID=192501255
-
(2006)
University research aims at more secure Wi-Fi
-
-
Shandle, J.1
|