共 50 条
- [2] BLUETOOTH SECURITY IN THE DOD [J]. MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 2425 - 2430
- [3] Security weaknesses in Bluetooth [J]. TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 176 - 191
- [4] A New Bluetooth Security Architecture [J]. TRENDS IN COMPUTER SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY, 2011, 204 : 507 - 515
- [5] Bluetooth -: Technology, security and weaknesses [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS I, 2002, : 191 - 196
- [6] Hardware implementation of bluetooth security [J]. IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 21 - 29
- [7] Demonstrating vulnerabilities in Bluetooth security [J]. GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1420 - 1424
- [9] Reserch of Bluetooth Security Manager [J]. PROCEEDINGS OF 2003 INTERNATIONAL CONFERENCE ON NEURAL NETWORKS & SIGNAL PROCESSING, PROCEEDINGS, VOLS 1 AND 2, 2003, : 1681 - 1684
- [10] An analysis of Bluetooth security vulnerabilities [J]. WCNC 2003: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1-3, 2003, : 1825 - 1831