Guide to Bluetooth Security
暂无分享,去创建一个
Karen A. Scarfone | Lidong Chen | John Padgette | John Bahr | Mayank Batra | Marcel Holtmann | Rhonda Smithbey | K. Scarfone | John Padgette | Lidong Chen | Mayank Batra | Marcel Holtmann | Rhonda Smithbey | John Bahr
[1] Avishai Wool,et al. Cracking the Bluetooth PIN , 2005, MobiSys '05.
[2] Willi Meier,et al. The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption , 2005, CRYPTO.