International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II 2005
DOI: 10.1109/itcc.2005.98
|View full text |Cite
|
Sign up to set email alerts
|

Bluetooth as an enabling technology in mobile transactions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 2 publications
0
7
0
Order By: Relevance
“…making it available for a connection. The relatively new attack known as blue snarfing, for example, allows intruders to gain access to Bluetooth enabled phones by exploiting a security flaw in the wireless protocol [14].…”
Section: Discussionmentioning
confidence: 99%
“…making it available for a connection. The relatively new attack known as blue snarfing, for example, allows intruders to gain access to Bluetooth enabled phones by exploiting a security flaw in the wireless protocol [14].…”
Section: Discussionmentioning
confidence: 99%
“…According to the Bluetooth Special Interest Group (SIG), in 2014 Bluetooth will be found in 70 percent of all handsets and 83 percent of all netbooks [11]. There are many implementations [12,13] as well as researches [14,15]on using Bluetooth in mobile payments.…”
Section: Bluetoothmentioning
confidence: 99%
“…making it available for a connection. The relatively new attack known as snarfing, for example, allows intruders to gain access to Bluetooth enabled phones by exploiting a security flaw in the wireless protocol [16].…”
Section: Limitations and Future Workmentioning
confidence: 99%