Demonstrating vulnerabilities in Bluetooth security.
Creighton T. R. HagerScott F. MidkiffPublished in: GLOBECOM (2003)
Keyphrases
- information security
- security vulnerabilities
- security issues
- security mechanisms
- security breaches
- security patterns
- mobile phone
- security requirements
- buffer overflow
- security flaws
- countermeasures
- intrusion detection
- network security
- security problems
- ubiquitous computing
- security risks
- security properties
- computer security
- security systems
- dos attacks
- access control
- smart card
- wifi
- security threats
- denial of service
- short range
- network administrators
- network management
- mobile devices
- cyber security
- long range
- sensitive data
- key management
- cryptographic protocols
- network monitoring
- information systems
- security analysis