Security Overview of Bluetooth
暂无分享,去创建一个
[1] Kaisa Nyberg,et al. Correlation Properties of the Bluetooth Combiner Generator , 1999, ICISC.
[2] Catharina Candolin. Security Issues for Wearable Computing and Bluetooth Technology , 2000 .
[3] Bart Preneel,et al. Cryptanalysis of the Bluetooth Stream Cipher , 2022 .
[4] Stefan Lucks,et al. Analysis of the E0 Encryption System , 2001, Selected Areas in Cryptography.
[5] Jovan Dj. Golic,et al. Linear Cryptanalysis of Bluetooth Stream Cipher , 2002, EUROCRYPT.
[6] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[7] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[8] Markus Jakobsson,et al. Security Weaknesses in Bluetooth , 2001, CT-RSA.