[1]
|
Bluetooth SIG, “Bluetooth Specification.”
http://www.bluetooth.org/Technical/Specifications/ adopted.htm
|
[2]
|
Bluetooth SIG, “Bluetooth Special Interest Group.” http://www.bluetooth.com/Pages/network-effect.aspx
|
[3]
|
H. Dwivedi, C. Clarck and D. Thiel, “Mobile Application Security,” McGraw Hill, 2010.
|
[4]
|
Bluetooth SIG, “Bluetooth Specification: Core Versione 2.0 + EDR,” 2004.
http://www.bluetooth.org/docman/handlers/DownloadDoc.ashx?doc_id=40560
|
[5]
|
Bluetooth SIG, “Bluetooth Specification: Core Versione 2.1 + EDR,” 2007.
http://www.bluetooth.org/docman/handlers/downloaddoc.ashx?doc_id=241363
|
[6]
|
Bluetooth SIG, “Bluetooth Specification: Core Versione 3.0 + HS,” 2009.
http://www.bluetooth.org/DocMan/handlers/DownloadDoc.ashx?doc_id=174214
|
[7]
|
Bluetooth SIG, “Bluetooth Specification: Core Versione 4.0,” 2010.
http://www.bluetooth.org/docman/handlers/downloaddoc.ashx?doc_id=229737
|
[8]
|
NIST, “Guide to Bluetooth Security (Draft), Special Pubblication 800-121, Rev. 1,” NIST, 2011.
|
[9]
|
W. Stallings, “Wireless Communications and Networks,” 2nd Edition, Prentice Hall, 2004.
|
[10]
|
S. Hay and R. Harle, “Bluetooth Tracking without Discoverability,” 4th International Symposium on Location and Context Awareness, Tokyo, 7-8 May 2009, pp. 120-137. doi:10.1007/978-3-642-01721-6_8
|
[11]
|
L. Carettoni, C. Merloni and S. Zanero, “Studying Bluetooth Malware Propagation: The Bluebag Project,” IEEE Security & Privacy, Vol. 5, No. 2, 2007, pp. 17-25.
doi:10.1109/MSP.2007.43
|
[12]
|
“Trifinite Group.” http://www.trifinite.org
|
[13]
|
M. Herfurt and C. Mulliner, “Remote Device Identification Based on Bluetooth Fingerprinting Techniques,” Trifinite Group, White Paper, 2004.
|
[14]
|
C. Gehrmann, J. Persson and B. Smeets, “Bluetooth Security,” Artech House, Inc., 2004.
|
[15]
|
I. Kounelis, J. Loschner, D. Shaw and S. Scheer, “Security of Service Requests for Cloud Based m-Commerce,” 2012 Proceedings of the 35th International Convention MIPRO, Opatija/Abbazia, 21-25 May 2012, pp. 1479-1483.
|
[16]
|
I. Kounelis, H. Zhao and S. Muftic, “Secure Middleware for Mobile Phones and UICC Applications,” Mobile Wireless Middleware, Operating Systems, and Applications, Berlin, 13-14 November 2012, pp. 143-152.
|
[17]
|
GSMA, “Mobile NFC Technical Guidelines, Version 2.0,” 2007.
|
[18]
|
NFC Forum, “Bluetooth Secure Simple Pairing Using NFC,” Application Document v1.0, 2011.
|