1BERESFORD A R, STAJANO F. Location privacy in pervasive computing[J]. IEEE Pervasive Computing, 2003,2(1):46-55.
2LIU L. From data privacy to location privacy: models and algorithms[A]. Proceedings of The 33rd International Conference on Very Large Data Bases(VLDB'07)[C]. Vienna, Austria, 2007. 1429- 1430.
3JAKOBSSON M, WETZEL S. Security weaknesses in bluetooth[A]. Cryptographer's Track at RSA Conf. 2001[C]. San Francisco, California, USA, 2001.176-191.
4WHITEHOUSE O. RedFang[EB/OL]. http://www.atstake.com/.2003.
5WONG F, STAJANO F. Location privacy in bluetooth[A]. 2nd European Workshop on Security and Privacy in Ad hoc and Sensor Networks[C]. Visegrad (HU), 2005.176-188.
6HAASE M, HANDY M. Bluetrack-imperceptible tracking of bluetooth devices[A]. UbiComp 2004[C]. Nottingham, England, 2004.
7SOLON A, CALLAGHAN M, HARKIN J. Case Study on the bluetooth vulnerabilities in mobile devices[J]. International Journal of Computer Science and Network Security, 2006, 6(4): 125-129.
8GEHRMANN C, NYBERG K. Enhancements to Bluetooth baseband security[A]. Proceedings of Nordsec 2001[C]. Copenhagen, Denmark, 2001.
9Bluetooth SIG Specification of the Bluctooth System: Core Package version 2.1+EDR[S]. http://www.bluetooth.org. 2007.