Sciweavers

468 search results - page 1 / 94
» Security Weaknesses in Bluetooth
Sort
View
CTRSA
2001
Springer
139views Cryptology» more  CTRSA 2001»
13 years 9 months ago
Security Weaknesses in Bluetooth
We point to three types of potential vulnerabilities in the
Markus Jakobsson, Susanne Wetzel
HICSS
2003
IEEE
134views Biometrics» more  HICSS 2003»
13 years 10 months ago
Secure Connections in Bluetooth Scatternets
Bluetooth is a wireless networking technology specifically developed for Personal Area Networking and other short range applications. Bluetooth devices can be networked together ...
Karl E. Persson, D. Manivannan
ISSA
2008
13 years 6 months ago
The Information Security of a Bluetooth-Enabled Handheld Device
Bluetooth connectivity allows workers to access information anywhere, including both personal and corporate information. Software and applications have been specifically developed...
Frankie Tvrz, Marijke Coetzee
ACSAC
2006
IEEE
13 years 10 months ago
Bluetooth Worms: Models, Dynamics, and Defense Implications
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Guanhua Yan, Stephan Eidenbenz
ADHOCNOW
2006
Springer
13 years 10 months ago
Improved Pairing Protocol for Bluetooth
Abstract. The Bluetooth wireless technology realizes a low-cost shortrange wireless voice- and data-connection through radio propagation. Bluetooth also has a security architecture...
Dave Singelée, Bart Preneel