105
click to vote
SPW
15 years 2 months ago
2005 Springer
Abstract. Many users routinely log in to their system with system administrator privileges. This is especially true of home users. The advantage of this setup is that these users c...
SPW
15 years 2 months ago
2005 Springer SPW
15 years 2 months ago
2005 Springer
Abstract. We implement and demonstrate a passive attack on the Bluetooth authentication protocol used to connect two devices to each other. Using a protocol analyzer and a brute-fo...
SPW
15 years 2 months ago
2005 Springer SPW
15 years 2 months ago
2005 Springer
Protecting users’ privacy is essential for turning networks and services into trustworthy friends. Many privacy enhancing techniques, such as anonymous e-cash and mix-nets, have...
|