期刊文献+

蓝牙加密算法及其仿真 被引量:3

Bluetooth Encyption Algorithm And Its Emulation
原文传递
导出
摘要 文章对蓝牙技术的安全机制作了描述 ,详细介绍了蓝牙链路层的加密算法E0流加密 ,并用C
出处 《电子技术(上海)》 2003年第2期22-24,共3页 Electronic Technology
  • 相关文献

参考文献5

  • 1Nathan J.Muller.Bluetooth Demystified[M].北京:人民邮电出版社,2001.8
  • 2Bluetooth Special internet Group. Bluetooth security architecture version 1.0[5 ], http://www. bluetooth. com/developer/specification/specification. asp, 1999
  • 3王震,吴平,叶家骏.蓝牙技术的安全机制[J].电子技术(上海),2001,28(9):31-33. 被引量:2
  • 4刘汉华,吴锐,全景才.蓝牙安全机制[J].电子质量,2001(6):25-28. 被引量:5
  • 5王国印等.Visual C++使用指南[M].北京:清华大学出版社,1997.6

共引文献5

同被引文献24

  • 1孙文生.蓝牙技术的安全机制[J].通信世界,2002(3):31-32. 被引量:7
  • 2Bluetooth Special Interest Group. IEEE 802.15.1 Specification of the Bluetooth System Profile v2.1 + EDR[ S]. 2007.
  • 3Stallings W. Network Security Essentials: Application and Standards(网络安全基础:应用与标准)[M].4版.北京:清华大学出版社,2010:9-12.
  • 4Muller NJ.Bluetooth Demystified(蓝牙揭秘)[M].北京:人民邮电出版社,2001:64-65,189.
  • 5Bluetooth Special Internet Group. Bluetooth Security Architecture vl. 0 [S]. 1999.
  • 6Ghanname T. How NFC can to speed Bluetooth transactions today [ J/ OL]. EEWimes, 2006. [2006. 2.14]. http://www, eetimes, corn/design/ comrnunications-design/4012606/How-NFC -can-to-speod-Bluetooth-trans- actions-151-today.
  • 7Shaked Y, Wool A. Cracking the Bluetooth PIN[ C]//Proceedings of 3rd USENIX/ACM Conference on Mobile Systems, Application and Service, 2005:39 -50.
  • 8ECMA-340. Near Field Communication Interface and Protocol (NF- CIP-1) 2nd Edition[ S]. 2004.
  • 9ECMA-352. Near Field Communication Interface and Protocol (NF- CIP-2) 1st Edition[S]. 2003.
  • 10Google. Google Android SDK [ EB/OL ]. http ://developer. android. com/reference/android/bluetooth/BluetoothAdapter, html.

引证文献3

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部