Login / Signup

An analysis of Bluetooth security vulnerabilities.

Creighton T. R. HagerScott F. Midkiff
Published in: WCNC (2003)
Keyphrases
  • data analysis
  • mobile phone
  • security vulnerabilities
  • real world
  • knowledge discovery
  • data processing
  • low cost