共 50 条
- [2] Attacks on Bluetooth Security Architecture and Its Countermeasures INFORMATION SECURITY AND ASSURANCE, 2010, 76 : 190 - 197
- [3] A Security Architecture Based on User Authentication of Bluetooth 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 627 - +
- [4] An Architecture Design for Wireless Authentication Security in Bluetooth Network INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 1 - 8
- [5] A proposal for improvement in service-level security architecture of Bluetooth IEEE TENCON 2003: CONFERENCE ON CONVERGENT TECHNOLOGIES FOR THE ASIA-PACIFIC REGION, VOLS 1-4, 2003, : 1057 - 1061
- [7] New scheme of improving link key for Bluetooth security Dongbei Daxue Xuebao/Journal of Northeastern University, 2003, 24 (05): : 424 - 428
- [9] BLUETOOTH SECURITY IN THE DOD MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 2425 - 2430
- [10] Security weaknesses in Bluetooth TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 176 - 191