{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T00:57:57Z","timestamp":1725843477843},"publisher-location":"Singapore","reference-count":11,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811002809"},{"type":"electronic","value":"9789811002816"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-981-10-0281-6_114","type":"book-chapter","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T04:57:57Z","timestamp":1450328277000},"page":"813-817","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing PIN Input for Preventing Eavesdropping in BLE Legacy Pairing"],"prefix":"10.1007","author":[{"given":"Jun Kwon","family":"Jung","sequence":"first","affiliation":[]},{"given":"Tai Myong","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,18]]},"reference":[{"key":"114_CR1","unstructured":"Spill, D., Bittau, A.: BlueSniff: eve meets alice and bluetooth. In: Proceedings of USENIX Workshop on Offensive Technologies (WOOT), August 2007"},{"key":"114_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/3-540-45353-9_14","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"M Jakobsson","year":"2001","unstructured":"Jakobsson, M., Wetzel, S.: Security weaknesses in bluetooth. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 176\u2013191. Springer, Heidelberg (2001)"},{"key":"114_CR3","unstructured":"Bluetooth Technology Website. \n                  http:\/\/www.bluetooth.com\/"},{"key":"114_CR4","unstructured":"Aissi, S., Gehrmann, C., Nyberg, K.: Proposal For Enhancing Bluetooth Security Using an Improved Pairing Mechanism. Presented to the Bluetooth Architecture Review Board at the Bluetooth All-Hands Meeting, April 19\u201323, 2004"},{"key":"114_CR5","unstructured":"Legg, G.: The bluejacking, bluesnarfing, bluebugging blues: Bluetooth faces perception of vulnerability, August 2005. \n                  http:\/\/www.wirelessnetdesignline.com\/192200279?printableArticle=true"},{"key":"114_CR6","volume-title":"Bluetooth: Connect Without Cables","author":"CF Struman","year":"2001","unstructured":"Struman, C.F., Bray, J.: Bluetooth: Connect Without Cables. Prentice Hall, Englewood Cliffs (2001)"},{"key":"114_CR7","unstructured":"Scarfone, K., Padgette, J.: Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology. Special Publication 800-121, National Institute of Standards and Technology (NIST), U.S. Department of Commerce (2008)"},{"key":"114_CR8","unstructured":"Vainio, J.: Bluetooth Security. Helsinki University of Technology (2000). \n                  http:\/\/www.cse.tkk.fi\/fi\/opinnot\/T-110.5190\/2000\/bluetoothsecurity\/bluesec.html\n                  \n                 (accessed 16 June, 2011)"},{"key":"114_CR9","unstructured":"Bialoglowy, M.: Bluetooth Security Review, Part I. Retrieved from \n                  http:\/\/www.symantec.com\/connect\/articles\/bluetooth-security-review-part-1\n                  \n                 (accessed, 19 June, 2011)"},{"key":"114_CR10","doi-asserted-by":"crossref","unstructured":"Shaked, Y., Wool, A.: Cracking the bluetooth PIN. In: 3rd USENIX\/ACM Conf. Mobile Systems, Applications, and Services (MobiSys), pp. 39\u201350 (2005)","DOI":"10.1145\/1067170.1067176"},{"key":"114_CR11","unstructured":"Laurie, A., Holtmann, M., HeMrfurt, M.: Bluetooth Hacking: The State of the Art. Retrieved from \n                  http:\/\/trifinite.org\/Downloads\/trifinite.presentation22c3berlin.pdf\n                  \n                 (accessed 10 June, 2011)"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Computer Science and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-0281-6_114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:17:35Z","timestamp":1559348255000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-0281-6_114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9789811002809","9789811002816"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-0281-6_114","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2015]]}}}