Application-level authentication and encryption atop Bluetooth stack for sensitive data communication.
Bogdan OnigaVasile DadarlatAdrian MunteanuPublished in: AQTR (2020)
Keyphrases
- application level
- sensitive data
- data confidentiality
- smart card
- privacy preserving
- network management
- security analysis
- encrypted data
- data storage
- operating system
- data quality
- third party
- quality of service
- sensitive information
- data protection
- information security
- confidential data
- digital signature
- secret key
- data sharing
- security requirements
- privacy protection
- authentication protocol
- data privacy
- virtual machine
- security mechanisms
- data security
- encryption scheme
- overlay network
- database
- data access
- computer networks
- databases
- encryption algorithm
- mobile agents
- database management systems