-
1
-
-
84889348936
-
-
Bluetooth Special Interest Group (SIG), Specification of the Bluetooth System, Version 1.2, Nov
-
Bluetooth Special Interest Group (SIG), Specification of the Bluetooth System, Version 1.2, http://www.bluetooth.org/spec/, Nov. 2003.
-
(2003)
-
-
-
2
-
-
33745762423
-
Bluetooth Security
-
Artech House, Norwood, MA
-
C. Gehrmann, J. Persson, and B. Smeets, Bluetooth Security, Artech House, Norwood, MA, 2004.
-
(2004)
-
-
Gehrmann, C.1
Persson, J.2
Smeets, B.3
-
3
-
-
84889411764
-
Differential cryptanalysis of SAFER+
-
Technical Report, Cylink, Sunnyvale, CA
-
M. Kuregian, G. H. Khachatrian, and J. L. Massey, Differential cryptanalysis of SAFER+, Technical Report, Cylink, Sunnyvale, CA, 1999.
-
(1999)
-
-
Kuregian, M.1
Khachatrian, G.H.2
Massey, J.L.3
-
4
-
-
4544275870
-
Redfang, War Nibbling: Bluetooth insecurity
-
software tool and research report, Oct
-
O. Whitehouse, Redfang, War Nibbling: Bluetooth insecurity, software tool and research report, http://www.atstake.com/research/tools/info_gathering/, Oct. 2003.
-
(2003)
-
-
Whitehouse, O.1
-
5
-
-
84889310019
-
Bluesniff, Bluetsniff-The next wardriving frontier
-
software tool and presentation, May
-
B. Potter and B. Caswell, Bluesniff, Bluetsniff-The next wardriving frontier, software tool and presentation, http://bluesniff.shmoo.com/, May 2004.
-
(2004)
-
-
Potter, B.1
Caswell, B.2
-
6
-
-
84935078039
-
Security weaknesses in Bluetooth
-
Proceedings of the RSA Conference 2001, LNCS 2020, Springer, New York
-
M. Jakobsson and S. Wetzel, Security weaknesses in Bluetooth, in Proceedings of the RSA Conference 2001, LNCS 2020, Springer, New York, 2001, pp. 176-191.
-
(2001)
, pp. 176-191
-
-
Jakobsson, M.1
Wetzel, S.2
-
7
-
-
0142099692
-
Wireless network security
-
802.11, Bluetooth and handheld devices, Special Publication 800-48, National Institute of Standards and Technology, Washington, DC, Nov
-
T. Karygiannis and L. Owens, Wireless network security, 802.11, Bluetooth and handheld devices, Special Publication 800-48, National Institute of Standards and Technology, Washington, DC, Nov. 2002.
-
(2002)
-
-
Karygiannis, T.1
Owens, L.2
-
8
-
-
4244031545
-
Bluetooth security
-
Technical Report
-
J. Vaino, Bluetooth security, Technical Report, http://www.niksula.cs.hut.fi/jiitv/bluesec.html, 2000.
-
(2000)
-
-
Vaino, J.1
-
9
-
-
31344471100
-
Preventing tracking and man in the middle attacks on Bluetooth devices
-
Financial Cryptography, Seventh International Conference 03, LNCS 2742, Springer, New York
-
D. Kügler, Preventing tracking and man in the middle attacks on Bluetooth devices, in Financial Cryptography, Seventh International Conference 03, LNCS 2742, Springer, New York, 2003, pp. 149-161.
-
(2003)
, pp. 149-161
-
-
Kügler, D.1
-
10
-
-
0003956839
-
The TLS protocol
-
Version 1.0, RFC 2246, Internet Engineering Task Force
-
T. Dierks and C. Allen, The TLS protocol, Version 1.0, RFC 2246, Internet Engineering Task Force, www.ietf.org, 1999.
-
(1999)
-
-
Dierks, T.1
Allen, C.2
-
11
-
-
0004115841
-
The Internet key exchange (IKE)
-
RFC 2409, Internet Engineering Task Force
-
D. Harkins and D. Carrel, The Internet key exchange (IKE), RFC 2409, Internet Engineering Task Force, www.ietf.org, 1998.
-
(1998)
-
-
Harkins, D.1
Carrel, D.2
-
12
-
-
84889339985
-
Higher layer key exchange techniques for Bluetooth security
-
paper presented at the Opengroup Conference, Amsterdam, Oct
-
J.-O. Larsson, Higher layer key exchange techniques for Bluetooth security, paper presented at the Opengroup Conference, Amsterdam, Oct. 2001.
-
(2001)
-
-
Larsson, J.-O.1
-
13
-
-
24644434353
-
Security in personal area networks
-
C. Michell, Ed., Security for Mobility, Institution of Electrical Engineers, London
-
C. Gehrmann and K. Nyberg, Security in personal area networks, in C. Michell, Ed., Security for Mobility, Institution of Electrical Engineers, London, 2004, pp. 191-230.
-
(2004)
, pp. 191-230
-
-
Gehrmann, C.1
Nyberg, K.2
-
15
-
-
84889289399
-
Shaman, deliverable 13
-
Technical Report, IST Project SHAMAN
-
S. Sovio et al., Shaman, deliverable 13, Technical Report, IST Project SHAMAN, http://www.ist-shaman.org, 2002.
-
(2002)
-
-
Sovio, S.1
-
16
-
-
23944521144
-
Manual Authentication for wireless devices
-
Spring
-
C. Gehrmann, C. Mitchell, and K. Nyberg, Manual Authentication for wireless devices, CryptoBytes, 6(1):29-37, Spring 2004.
-
(2004)
CryptoBytes
, vol.6
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.2
Nyberg, K.3
-
17
-
-
84889452144
-
-
ISO/IEC 10118-3: 2003, Information technology-Security techniques-Entity authentication-Part 6:Mechanism using manual data transfer, International Organization for Standardization, Geneva, Dec
-
ISO/IEC 10118-3: 2003, Information technology-Security techniques-Entity authentication-Part 6:Mechanism using manual data transfer, International Organization for Standardization, Geneva, Dec. 2003.
-
(2003)
-
-
-
18
-
-
33646048509
-
The personal PKI
-
C. Michell, Ed., Security for Mobility, Institution of Electrical Engineers, London
-
C. Mitchell and R. Schaffelhofer, The personal PKI, in C. Michell, Ed., Security for Mobility, Institution of Electrical Engineers, London, 2004, pp. 35-61.
-
(2004)
, pp. 35-61
-
-
Mitchell, C.1
Schaffelhofer, R.2
-
19
-
-
0024860262
-
Fast correlation attacks on certain stream ciphers
-
W. Meier and O. Staffelbach, Fast correlation attacks on certain stream ciphers, Journal of Cryptology, 1:159-176, 1989.
-
(1989)
Journal of Cryptology
, vol.1
, pp. 159-176
-
-
Meier, W.1
Staffelbach, O.2
-
20
-
-
84958740066
-
Correlation properties of the Bluetooth summation combiner
-
Proceedings of ICISC'99, 1999 International Conference on Information Security and Cryptography, LNCS 1787, Springer, New York
-
M. Hermelin and K. Nyberg, Correlation properties of the Bluetooth summation combiner, in Proceedings of ICISC'99, 1999 International Conference on Information Security and Cryptography, LNCS 1787, Springer, New York, 1999, pp. 17-29.
-
(1999)
, pp. 17-29
-
-
Hermelin, M.1
Nyberg, K.2
-
21
-
-
33745132902
-
Some results on correlations in the Bluetooth stream cipher
-
Proceedings of the Tenth Joint Conference on Communications and Coding, Austin, TX
-
P. Ekdahl and T. Johansson, Some results on correlations in the Bluetooth stream cipher, in Proceedings of the Tenth Joint Conference on Communications and Coding, Austin, TX, 2000, p. 16.
-
(2000)
, pp. 16
-
-
Ekdahl, P.1
Johansson, T.2
-
22
-
-
84949226395
-
Analysis of the E0 cryptosystem
-
Proceedings of Selected Areas in Cryptography 01, LNCS 2259, Springer, New York
-
S. Fluhrer and S. Lucks, Analysis of the E0 cryptosystem, in Proceedings of Selected Areas in Cryptography 01, LNCS 2259, Springer, New York, 2001, pp. 38-48.
-
(2001)
, pp. 38-48
-
-
Fluhrer, S.1
Lucks, S.2
-
23
-
-
84935039488
-
BDD based cryptanalysis of keystream generators
-
Proceedings of Eurocrypt 02, LNCS 2332, Springer, New York
-
M. Krause, BDD based cryptanalysis of keystream generators, in Proceedings of Eurocrypt 02, LNCS 2332, Springer, New York, 2002, pp. 222-237.
-
(2002)
, pp. 222-237
-
-
Krause, M.1
-
24
-
-
35248840147
-
Algebraic attacks on combiners with memory
-
Proceedings of Crypto 03, LNCS 2729, Springer, New York
-
F. Armknecht and M. Krause, Algebraic attacks on combiners with memory, in Proceedings of Crypto 03, LNCS 2729, Springer, New York, 2003, pp. 162-175.
-
(2003)
, pp. 162-175
-
-
Armknecht, F.1
Krause, M.2
-
25
-
-
35248849880
-
Fast algebraic attacks on stream ciphers with linear feedback
-
Proceedings of Crypto 03, LNCS 2729, Springer, New York
-
N. Courtois, Fast algebraic attacks on stream ciphers with linear feedback, in Proceedings of Crypto 03, LNCS 2729, Springer, New York, 2003, pp. 176-194.
-
(2003)
, pp. 176-194
-
-
Courtois, N.1
-
26
-
-
0009402121
-
Bluetooth security architecture
-
White Paper Revision 1.0, Bluetooth SIG, July
-
T. Mueller, Bluetooth security architecture, White Paper Revision 1.0, Bluetooth SIG, July 1999.
-
(1999)
-
-
Mueller, T.1
-
27
-
-
27944502870
-
Serious flaws in Bluetooth security lead to disclosure of personal data
-
Nov
-
A. Laurie, Serious flaws in Bluetooth security lead to disclosure of personal data, http://www.bluestumble.org/, Nov. 2003.
-
(2003)
-
-
Laurie, A.1
|