Sciweavers

43 search results - page 2 / 9
» Bluetooth Security
Sort
View
MOBISYS
2005
ACM
14 years 7 months ago
Cracking the Bluetooth PIN
This paper describes the implementation of an attack on the Bluetooth security mechanism. Specifically, we describe a passive attack, in which an attacker can find the PIN used du...
Yaniv Shaked, Avishai Wool
FC
2007
Springer
152views Cryptology» more  FC 2007»
14 years 1 months ago
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup
Abstract. Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless networks. Both Simple Pairing and Protected Se...
Cynthia Kuo, Jesse Walker, Adrian Perrig
CTRSA
2001
Springer
139views Cryptology» more  CTRSA 2001»
13 years 12 months ago
Security Weaknesses in Bluetooth
We point to three types of potential vulnerabilities in the
Markus Jakobsson, Susanne Wetzel
DUD
2002
78views more  DUD 2002»
13 years 7 months ago
Bluetooth Security
Dirk Fox
COMCOM
2006
148views more  COMCOM 2006»
13 years 7 months ago
An adaptive bluetooth packet selection and scheduling scheme in interference environments
Bluetooth is a new technology for Wireless Personal Area Networks (WPANs). It intends to eliminate the need of wires and connectors between a variety of devices, like PCs and thei...
Chen-Han Shih, Kuochen Wang, Hung-Cheng Shih