Login / Signup
Secure Connections in Bluetooth Scatternets.
Karl E. Persson
D. Manivannan
Published in:
HICSS (2003)
Keyphrases
</>
mobile phone
ubiquitous computing
security requirements
wifi
authentication scheme
neural network
security properties
short range
security mechanisms
multi hop
security issues
security protocols
key distribution
user authentication
ambient intelligence
real time
security management
diffie hellman