Login / Signup
Wi-attack: Cross-technology Impersonation Attack against iBeacon Services.
Xin Na
Xiuzhen Guo
Yuan He
Rui Xi
Published in:
CoRR (2022)
Keyphrases
</>
authentication protocol
key technologies
information society
cost effective
smart card
secret key
countermeasures
web intelligence
service discovery
web services
ddos attacks
security analysis
web technologies
service providers
case study
information systems
service oriented
lifecycle management