CORE
🇺🇦Â
 make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
Filters
3 research outputs found
Thomas Xydis Ensure Technologies
Author
Bluetooth Security
Christian Gehrmann
+10Â more
Christian Gehrmann
Dan Willey Certicom
Ericsson Technology
Ericsson Technology
Georges Seuron
Ibm Corporation
Licensing Ab
Licensing Ab
Simon Blake-wilson Certicom
White Paper
Publication venue
Publication date
Field of study
No full text
This document describes the usage of Bluetooth Security as well as additional security mechanisms for selected Bluetooth wireless profiles. BLUETOOTH SI
CiteSeerX
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy
Author
Antonioli Daniele
Armis Inc.
+27Â more
Armis Inc.
Authority Python Cryptographic
Barker Elaine
Biham Eli
Bluetooth
Bluetooth
Cauquil Damien
Delmas Arnaud
Dunning John
Fawaz Kassem
Griffin Kent
Hypponen Konstantin
IETF.
Jasek SÅ‚awomir
Jonsson Jakob
Kak Avinash
Kelsey John
Massey James L.
National Security Agency USA.
Ossmann Michael
Padgette John
Ryan Mike
Ryan Mike
Shaik Altaf
Team Google Cloud
Vainio Juha T.
Vanhoef Mathy
Publication venue
'Association for Computing Machinery (ACM)'
Publication date
Field of study
No full text
Crossref