1. Bluetooth SIG Inc.: Bluetooth Specification: File Transfer Profile (FTP) (2012)
2. Chang, R., Shmatikov, V.: Formal analysis of authentication in bluetooth device pairing. In: Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis, p. 45. Wroclaw, Poland (2007)
3. Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of 20th USENIX Security Symp. pp. 77–92. USENIX Assoc., San Francisco, August 2011
4. Dunning, J.P.: Taming the blue beast: a survey of bluetooth based threats. IEEE Secur. Priv. 8(2), 20–27 (2010)
5. EVITA Project: Deliverable D2.3 - Security requirements for automotive on-board networks based on dark-side scenarios. Technical report (2009)