Developing a New Security Framework for Bluetooth Low Energy Devices
暂无分享,去创建一个
[1] Hao Jiang,et al. A Medical Healthcare System for Privacy Protection Based on IoT , 2015, 2015 Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP).
[2] Yao Zheng,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.
[3] Fang Liu,et al. Security and Privacy in the Medical Internet of Things: A Review , 2018, Secur. Commun. Networks.
[4] Yanzhen Qu,et al. Assessing Vulnerabilities in Bluetooth Low Energy (BLE) Wireless Network Based IoT Systems , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).
[5] Bruno. Blanchet,et al. Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif , 2016, Found. Trends Priv. Secur..
[6] Vitaly Shmatikov,et al. Formal Analysis of Authentication in Bluetooth Device Pairing , 2007 .
[7] Zhiyao Liang,et al. Security analysis of bluetooth low energy based smart wristbands , 2017, 2017 2nd International Conference on Frontiers of Sensors Technologies (ICFST).
[8] Rakesh M. Verma,et al. Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity , 2009, ICISS.
[9] Rakesh M. Verma,et al. Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[10] Joshua D. Guttman,et al. Security protocol design via authentication tests , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[11] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[12] Mike Ryan,et al. Bluetooth: With Low Energy Comes Low Security , 2013, WOOT.