Cited By
View all- Ai MXue KLuo BChen LYu NSun QWu FYin HStavrou ACremers CShi E(2022)BlacktoothProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560668(55-68)Online publication date: 7-Nov-2022
- Sun DMu YSusilo W(2018)Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasurePersonal and Ubiquitous Computing10.1007/s00779-017-1081-622:1(55-67)Online publication date: 1-Feb-2018
- Das MMukkamala R(2008)Revisiting Bluetooth Security (Short Paper)Proceedings of the 4th International Conference on Information Systems Security10.1007/978-3-540-89862-7_10(132-139)Online publication date: 16-Dec-2008
- Show More Cited By