暂无分享,去创建一个
[1] K. Hypponen,et al. Man-In-The-Middle attacks on bluetooth: a comparative analysis, a novel attack, and countermeasures , 2008, 2008 3rd International Symposium on Communications, Control and Signal Processing.
[2] Markus Jakobsson,et al. Security Weaknesses in Bluetooth , 2001, CT-RSA.
[3] William Stallings,et al. Cryptography and network security , 1998 .
[4] Dennis Kügler,et al. "Man in the Middle" Attacks on Bluetooth , 2003, Financial Cryptography.
[5] K. Hypponen,et al. “Nino” man-in-the-middle attack on bluetooth secure simple pairing , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.
[6] Ersin Uzun,et al. Usability Analysis of Secure Pairing Methods , 2007, Financial Cryptography.
[7] Keijo Haataja. New practical attack against Bluetooth security using efficient implementations of security analysis tools , 2007 .