02634nam 2200613 450 991078328230332120230126210806.01-58053-885-1(CKB)1000000000023478(EBL)227650(OCoLC)304072275(SSID)ssj0000113418(PQKBManifestationID)11125005(PQKBTitleCode)TC0000113418(PQKBWorkID)10100155(PQKB)10984636(Au-PeEL)EBL227650(CaPaEBR)ebr10082041(CaBNVSL)mat09107197(IEEE)9107197(MiAaPQ)EBC227650(EXLCZ)99100000000002347820200729d2004 uy engur|n|---|||||txtccrBluetooth security /Christian Gehrmann, Joakim Persson, Ben SmeetsBoston :Artech House,©2004.[Piscataqay, New Jersey] :IEEE Xplore,[2004]1 online resource (221 p.)Artech House computer security seriesDescription based upon print version of record.1-58053-504-6 Includes bibliographical references and index.Machine generated contents note: 1. Introduction -- 2. Overview of the Bluetooth security architecture -- 3. Bluetooth pairing and key management -- 4. Algorithms -- 5."This resource examine the most significant attacks on Bluetooth security mechanisms and their implementations, demonstrating how some of these known weaknesses can be avoided with appropriate defensive measures. The book presents concrete examples of how to design security solutions for some Bluetooth applications and products built on these applications. Professionals find real-world case studies including technical algorithms, mechanisms and protocols, and security architecture. These architectures offer valuable guidelines for use in building Bluetooth and non-Bluetooth-specific security mechanisms."--Jacket.Artech House computer security series.Bluetooth technologySecurity measuresComputer securityBluetooth technologySecurity measures.Computer security.005.8Gehrmann Christian1507632Persson Joakim1507633Smeets Ben1507634CaBNVSLCaBNVSLCaBNVSLBOOK9910783282303321Bluetooth security3738531UNINA