Sciweavers

468 search results - page 2 / 94
» Security Weaknesses in Bluetooth
Sort
View
LOCA
2009
Springer
13 years 12 months ago
Bluetooth Tracking without Discoverability
Outdoor location-based services are now prevalent due to advances in mobile technology and GPS. Indoors, however, even coarse location remains unavailable. Bluetooth has been ident...
Simon Hay, Robert Harle
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
13 years 11 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
FC
2007
Springer
152views Cryptology» more  FC 2007»
13 years 11 months ago
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup
Abstract. Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless networks. Both Simple Pairing and Protected Se...
Cynthia Kuo, Jesse Walker, Adrian Perrig
DUD
2002
78views more  DUD 2002»
13 years 5 months ago
Bluetooth Security
Dirk Fox