Login / Signup
Securing Bluetooth Communications.
Tzu-Chang Yeh
Jian-Ren Peng
Sheng-Shih Wang
Jun-Ping Hsu
Published in:
Int. J. Netw. Secur. (2012)
Keyphrases
</>
mobile phone
ubiquitous computing
wifi
communication systems
short range
mobile terminals
communication networks
data sets
cellular phone
information security
decision trees
real time
case study
network management
multi hop
information systems
machine learning
multiple access