-
1
-
-
70449557994
-
-
Keijo M.J. Haataja, Konstantin Hypponen, Man-In-The-Middle Attacks on Bluetooth: a Comparative Analysis, a Novel Attack, and Countermeasures. ISCCSP 2008, Malta, 12-14 March 2008
-
Keijo M.J. Haataja, Konstantin Hypponen, Man-In-The-Middle Attacks on Bluetooth: a Comparative Analysis, a Novel Attack, and Countermeasures. ISCCSP 2008, Malta, 12-14 March 2008
-
-
-
-
2
-
-
48749083665
-
Nino
-
Tashkent, Uzbekistan, September 26-28
-
K. Hypponen, K. Haataja, "Nino" Man-In-The-Middle Attack on Bluetooth Secure Simple Pairing. Proceedings of the IEEE Third International Conference in Central Asia on Internet, The Next Generation of Mobile, Wireless and Optical Communications Networks (ICI'2007), Tashkent, Uzbekistan, September 26-28, 2007.
-
(2007)
Man-In-The-Middle Attack on Bluetooth Secure Simple Pairing. Proceedings of the IEEE Third International Conference in Central Asia on Internet, The Next Generation of Mobile, Wireless and Optical Communications Networks (ICI
-
-
Hypponen, K.1
Haataja, K.2
-
3
-
-
84935078039
-
Security weaknesses in Bluetooth
-
Springer-Verlag
-
M. Jakobsson, S. Wetzel, Security weaknesses in Bluetooth. LNCS, Vol. 2020, pp. 176-191, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2020
, pp. 176-191
-
-
Jakobsson, M.1
Wetzel, S.2
-
4
-
-
31344471100
-
Man in the middle attacks on Bluetooth
-
Financial Cryptography, Springer-Verlag
-
D. Kugler, Man in the middle attacks on Bluetooth. Financial Cryptography, LNCS, vol. 2742, pp. 149-161, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2742
, pp. 149-161
-
-
Kugler, D.1
-
5
-
-
60149100977
-
-
Core Specification Working Group, august
-
Core Specification Working Group, Simple Pairing Whitepaper, august 2006.
-
(2006)
Simple Pairing Whitepaper
-
-
-
6
-
-
84934288261
-
Bluetooth Secure Simple Pairing, wirelessdesignmag.com, cover story
-
December
-
Anindya Bakshi, Bluetooth Secure Simple Pairing, wirelessdesignmag.com, cover story December 2007.
-
(2007)
-
-
Bakshi, A.1
-
9
-
-
70449573937
-
-
Eric Gauthier, A man-in-the-middle attack using Bluetooth in a WLAN interworking environment, 3GPP TSG SA WG3 Security#32 9-13 February, 2004
-
Eric Gauthier, A man-in-the-middle attack using Bluetooth in a WLAN interworking environment, 3GPP TSG SA WG3 Security#32 9-13 February, 2004
-
-
-
-
10
-
-
62649095696
-
New Practical Attack Against Bluetooth Security Using Efficient Implementations of Security Analysis Tools
-
Berkeley, California, USA, September 24-26
-
K. Haataja, New Practical Attack Against Bluetooth Security Using Efficient Implementations of Security Analysis Tools. Proceedings of the IASTED International Conference on Communication, Network and Information Security (CNIS'2007), Berkeley, California, USA, September 24-26, 2007.
-
(2007)
Proceedings of the IASTED International Conference on Communication, Network and Information Security (CNIS'2007)
-
-
Haataja, K.1
-
11
-
-
70449576970
-
-
Bluetooth SIG, Bluetooth specifications 1.0-2.1+EDR. Technical specifications, 1999-2007. http://www.bluetooth.com
-
Bluetooth SIG, Bluetooth specifications 1.0-2.1+EDR. Technical specifications, 1999-2007. http://www.bluetooth.com
-
-
-
-
12
-
-
70449552651
-
-
Bluetooth Special Interest Group
-
Bluetooth Special Interest Group, Bluetooth 2.0 and 2.1 specifications, http://www.bluetooth.com/Bluetooth/Technology/Building/Specifications/
-
Bluetooth 2.0 and 2.1 specifications
-
-
-
14
-
-
31344471100
-
Man in the middle attacks on Bluetooth
-
Financial Cryptography, Springer-Verlag
-
D. Kugler, Man in the middle attacks on Bluetooth. Financial Cryptography, LNCS, vol. 2742, pp. 149-161, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2742
, pp. 149-161
-
-
Kugler, D.1
|