Sign in

Security threats in Bluetooth technology.

Shaikh Shahriar HassanSoumik Das BibonMd. Shohrab HossainMohammed Atiquzzaman
Published in: Comput. Secur. (2018)
Keyphrases
  • security threats
  • security issues
  • cost effective
  • databases
  • security mechanisms
  • key management
  • data processing
  • data mining
  • computer systems
  • resource constraints