02668nam 2200625 450 991044993940332120200520144314.01-58053-885-1(CKB)1000000000023478(EBL)227650(OCoLC)304072275(SSID)ssj0000113418(PQKBManifestationID)11125005(PQKBTitleCode)TC0000113418(PQKBWorkID)10100155(PQKB)10984636(MiAaPQ)EBC227650(Au-PeEL)EBL227650(CaPaEBR)ebr10082041(CaBNVSL)mat09107197(IEEE)9107197(EXLCZ)99100000000002347820200729d2004 uy engur|n|---|||||txtccrBluetooth security /Christian Gehrmann, Joakim Persson, Ben SmeetsBoston :Artech House,©2004.[Piscataqay, New Jersey] :IEEE Xplore,[2004]1 online resource (221 p.)Artech House computer security seriesDescription based upon print version of record.1-58053-504-6 Includes bibliographical references and index.Machine generated contents note: 1. Introduction -- 2. Overview of the Bluetooth security architecture -- 3. Bluetooth pairing and key management -- 4. Algorithms -- 5."This resource examine the most significant attacks on Bluetooth security mechanisms and their implementations, demonstrating how some of these known weaknesses can be avoided with appropriate defensive measures. The book presents concrete examples of how to design security solutions for some Bluetooth applications and products built on these applications. Professionals find real-world case studies including technical algorithms, mechanisms and protocols, and security architecture. These architectures offer valuable guidelines for use in building Bluetooth and non-Bluetooth-specific security mechanisms."--Jacket.Artech House computer security series.Bluetooth technologySecurity measuresComputer securityElectronic books.Bluetooth technologySecurity measures.Computer security.005.8Gehrmann Christian1047985Persson Joakim1047986Smeets Ben1047987CaBNVSLCaBNVSLCaBNVSLBOOK9910449939403321Bluetooth security2475943UNINA