共 50 条
- [2] A Security Architecture Based on User Authentication of Bluetooth 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 627 - +
- [3] Developing a New Security Framework for Bluetooth Low Energy Devices CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 59 (02): : 457 - 471
- [4] Demonstrating vulnerabilities in Bluetooth security GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1420 - 1424
- [5] An Investigation of Bluetooth Security Vulnerabilities 2017 IEEE 7TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE IEEE CCWC-2017, 2017,
- [6] An analysis of Bluetooth security vulnerabilities WCNC 2003: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1-3, 2003, : 1825 - 1831
- [7] New Security Architecture for IoT Network 6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 1028 - 1033
- [8] Bluetooth Security Analysis for Mobile Phones 7TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2012), 2012,
- [9] Bluetooth Security Analysis for Mobile Phones SISTEMAS Y TECNOLOGIAS DE INFORMACION, VOLS 1 AND 2, 2012, : 169 - 174
- [10] Analyzing the Security of Bluetooth Low Energy 2019 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2019, : 568 - 572