Login / Signup
Quantifying the Risk of Wormhole Attacks on Bluetooth Contact Tracing.
Stefan Czybik
Daniel Arp
Konrad Rieck
Published in:
CODASPY (2022)
Keyphrases
</>
security risks
countermeasures
mobile phone
high risk
risk management
risk measures
short range
risk analysis
security mechanisms
decision making
security threats
long range
ubiquitous computing
mobile terminals
watermarking scheme
traffic analysis
watermarking method
malicious attacks