Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation Scheme for Security Modes 2 and 3.
Da-Zhi SunXiao-Hong LiPublished in: ICICS (2016)
Keyphrases
- digital signature scheme
- security vulnerabilities
- authentication scheme
- image enhancement
- public key cryptosystem
- mobile phone
- image processing
- information security
- risk assessment
- security analysis
- protection scheme
- identity based cryptography
- secure communication
- buffer overflow
- key management scheme
- destination node
- authentication mechanism
- high security
- diffie hellman
- key agreement
- private key
- key distribution
- security model
- elliptic curve
- statistical databases
- access control
- mobile devices
- provably secure
- security risks
- cellular phone
- security requirements
- ubiquitous computing
- network security