Login / Signup
Two-party secure connection in Bluetooth-enabled devices.
Samta Gajbhiye
Sanjeev Karmakar
Monisha Sharma
Sanjay Sharma
Published in:
Inf. Secur. J. A Glob. Perspect. (2018)
Keyphrases
</>
mobile terminals
key agreement protocol
mobile phone
mobile devices
mobile agent system
ubiquitous computing
smart phones
security model
personal computer
security requirements
rfid tags
multi hop
context aware
low cost
lightweight
wifi
security mechanisms
key management
cellular phone
neural network