Securing Bluetooth Communications
暂无分享,去创建一个
Sheng-Shih Wang | Tzu-Chang Yeh | Jian-Ren Peng | Jun-Ping Hsu | Sheng-Shih Wang | Tzu-Chang Yeh | Jianmin Peng | Jun-Ping Hsu
[1] Dirk Fox,et al. Bluetooth Security , 2002, Datenschutz und Datensicherheit.
[2] Avishai Wool,et al. Cracking the Bluetooth PIN , 2005, MobiSys '05.
[3] Carl Adams,et al. Short-range wireless technologies with mobile payments systems , 2004, ICEC '04.
[4] Keijo Haataja,et al. Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures , 2010, IEEE Transactions on Wireless Communications.
[5] Jennifer Bray,et al. Bluetooth application developer's guide : the short range interconnect solution , 2002 .
[6] Agnieszka Zmijewska,et al. Evaluating wireless technologies in mobile payments - a customer centric approach , 2005, International Conference on Mobile Business (ICMB'05).
[7] Alejandro Quintero,et al. Mobile services access and payment through reusable tickets , 2009, Comput. Commun..
[8] Elaine Lawrence,et al. Bluetooth as an enabling technology in mobile transactions , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[9] V. Lenin,et al. The United States of America , 2002, Government Statistical Agencies and the Politics of Credibility.
[10] Karen A. Scarfone,et al. Guide to Bluetooth Security , 2008 .
[11] Chun-Ta Li,et al. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..
[12] Ersin Uzun,et al. Usability Analysis of Secure Pairing Methods , 2007, Financial Cryptography.