Login / Signup
Security threats in Bluetooth technology.
Shaikh Shahriar Hassan
Soumik Das Bibon
Md. Shohrab Hossain
Mohammed Atiquzzaman
Published in:
Comput. Secur. (2018)
Keyphrases
</>
security threats
security issues
cost effective
databases
security mechanisms
key management
data processing
data mining
computer systems
resource constraints