1 |
M. Hermelin and K. Nyberg. Correlation Properties of the Bluetooth Combiner Generator. In ICISC'99, volume 1787 of LNCS. Springer Verlagg, 2000
|
2 |
http://www.niksula.cs.hut/fi/~ji itv/bluesec.html (Juha T.Vainio, 'Bluetooth Security', jssmd 2000)
|
3 |
S. Fluhrer and S. Lucks, 'Analysis of the E0 Encryption System' available from S.Lucks' web site at http://th.informatik.uni-mannheim.de/People/Lucks/papers/e0.ps.gz, agnu-zippedPost- script file
|
4 |
http://www.bluetooth.com (Bluetooth White Paper)
|
5 |
Bluetooth SIG, Specification of the Bluetooth system, Profiles', Version 1.1, February 22, 2001, available at http://www.bluetooth.com/
|
6 |
Bluetooth SIG, Specification of the Bluetooth system, Core', Version 1.1, February 22, 2001, available at http://www.bluetooth.com/
|
7 |
http://www.cs.hut.fi/Opinnot/Tik-86.174/ sectopics.html(Ullgren T, 'Security in Bluetooth Key management in Bluetooth', 2001)
|
8 |
Bluetooth Security Architecture, 1999, available at http://www.bluetooth.com/
|
9 |
http://www.bell-labs.com/user/markusj/ bt.html (Jakobsson M and Wetzel S, 'Security Weakness in Bluetooth', RSA, 2001)
|
10 |
http://mmlab.snu.ac.kr/research/publication/docs/KISS2002_jklee.pdf
|
11 |
Specification of the Bluetooth System, 1999, available at http://www.bluetooth. com/
|