Login / Signup
Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures.
Keijo Haataja
Pekka J. Toivanen
Published in:
IEEE Trans. Wirel. Commun. (2010)
Keyphrases
</>
countermeasures
security measures
information security
java card
power analysis
security issues
cyber attacks
rural areas
real world
information systems
mobile phone
differential power analysis
intrusion detection
security threats
sql injection