Bluetooth Security - An Overview.
Joakim PerssonBen J. M. SmeetsPublished in: Inf. Secur. Tech. Rep. (2000)
Keyphrases
- security requirements
- information security
- mobile phone
- intrusion detection
- access control
- statistical databases
- security issues
- security threats
- computer security
- network security
- security mechanisms
- security level
- ubiquitous computing
- network management
- data sets
- key management
- electronic commerce
- authentication protocol
- security model
- security properties
- security problems
- anomaly detection
- information assurance