Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

secure connection establishment

biblio

Visible to the public BIAS: Bluetooth Impersonation AttackS

Submitted by grigby1 on Mon, 12/28/2020 - 12:27pm
  • attacks
  • wireless communication pervasive technology
  • slave impersonation attacks
  • secure connection establishment
  • secure authentication procedure
  • mandatory mutual authentication
  • impersonation
  • Bluetooth version
  • Bluetooth standard
  • Bluetooth Impersonation AttackS
  • Bluetooth devices
  • Bluetooth chips
  • BIAS attacks
  • authentication procedure
  • bluetooth security
  • wireless security
  • authorisation
  • mobile radio
  • ubiquitous computing
  • composability
  • standards
  • Protocols
  • Cryptography
  • authentication
  • performance evaluation
  • telecommunication security
  • Resiliency
  • resilience
  • Human behavior
  • pubcrawl
  • Bluetooth

Terms of Use  |  ©2023. CPS-VO