Login / Signup

Relay Attacks on Bluetooth Authentication and Solutions.

Albert LeviErhan ÇetintasMurat AydosÇetin Kaya KoçM. Ufuk Çaglayan
Published in: ISCIS (2004)
Keyphrases
  • security mechanisms
  • digital watermarking
  • semi fragile watermarking
  • digital images
  • mobile phone
  • multi hop
  • genetic algorithm