1. Bridgefy, April 2020. https://web.archive.org/web/20200411143157/www.bridgefy.me/
2. Adomnicai, A., Fournier, J.J.A., Masson, L.: Hardware security threats against Bluetooth mesh networks. In: 2018 IEEE Conference on Communications and Network Security, CNS 2018, Beijing, China, 30 May–1 June 2018, pp. 1–9. IEEE (2018). https://doi.org/10.1109/CNS.2018.8433184
3. Álvarez, F., Almon, L., Hahn, A., Hollick, M.: Toxic friends in your network: breaking the Bluetooth Mesh friendship concept. In: Mehrnezhad, M., van der Merwe, T., Hao, F. (eds.) Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, London, UK, 11 November 2019, pp. 1–12. ACM (2019). https://doi.org/10.1145/3338500.3360334
4. Alwen, J., et al.: Keep the dirt: Tainted TreeKEM, an efficient and provably secure continuous group key agreement protocol. Cryptology ePrint Archive, Report 2019/1489 (2019). https://eprint.iacr.org/2019/1489
5. Alwen, J., Coretti, S., Dodis, Y., Tselekounis, Y.: Security analysis and improvements for the IETF MLS standard for group messaging. Cryptology ePrint Archive, Report 2019/1189 (2019). https://eprint.iacr.org/2019/1189