Login / Signup
Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing.
Mohit Kumar Jangid
Yue Zhang
Zhiqiang Lin
Published in:
NDSS (2023)
Keyphrases
</>
formal analysis
mobile phone
countermeasures
wifi
ubiquitous computing
formal methods
end to end
agent model
security mechanisms
ban logic
short range
security protocols
watermarking scheme
mobile terminals
relational databases
cellular phone
database systems