正在加载图片...
[43] T Schmidt and A, Townsend, " Why Wi-Fi wants to be [46]B Potter, "Bluetooth vulnerabilities, "Newwork Securin pp 47-52.2003 147 A P Snow, U. Varshney, and A D Malloy, 44w.A Arbaugh, "Wireless Security Is Different, Computer;, vol 35, no 8, pp. 99-101, 2003 5 Laurie, A, (20-5-2004). Serious flaws in Bluetooth ecurity lead to disclosure of personal data. ALD IOnline]. Available from http://www.thebunkernet/release-bluestumbler.htm [ Accessed20-2-2004][43] T. Schmidt and A. Townsend, "Why Wi-Fi wants to be free," Communications of the ACM, vol. 46, no. 5, pp. 47-52, 2003. [44] W. A. Arbaugh, "Wireless Security Is Different," Computer, vol. 35, no. 8, pp. 99-101, 2003. [45] Laurie, A, (20-5-2004). Serious flaws in Bluetooth security lead to disclosure of personal data. ALD [Online]. Available from: http://www.thebunker.net/release-bluestumbler.htm [Accessed 20-2-2004] [46] B. Potter, "Bluetooth vulnerabilities," Network Security, vol. 2004, no. 3, pp. 4-5, 2004. [47] A. P. Snow, U. Varshney, and A. D. Malloy, "Reliability and survivability of wireless and mobile networks," Computer, vol. 33, no. 7, pp. 49-55, 2000
<<向上翻页
©2008-现在 cucdc.com 高等教育资讯网 版权所有