Login / Signup
Relay Attacks on Bluetooth Authentication and Solutions.
Albert Levi
Erhan Çetintas
Murat Aydos
Çetin Kaya Koç
M. Ufuk Çaglayan
Published in:
ISCIS (2004)
Keyphrases
</>
security mechanisms
digital watermarking
semi fragile watermarking
digital images
mobile phone
multi hop
genetic algorithm