Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures /
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literatur...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | Haataja, Keijo (Autor), Hyppönen, Konstantin (Autor), Pasanen, Sanna (Autor), Toivanen, Pekka (Autor) |
Autor Corporativo: | SpringerLink (Online service) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2013.
|
Edición: | 1st ed. 2013. |
Colección: | SpringerBriefs in Computer Science,
|
Temas: | |
Acceso en línea: | Texto Completo |
Ejemplares similares
-
Insider Attack and Cyber Security Beyond the Hacker /
Publicado: (2008) -
Power Analysis Attacks Revealing the Secrets of Smart Cards /
por: Mangard, Stefan, et al.
Publicado: (2007) -
Cryptographic Protocol Security Analysis Based on Trusted Freshness /
por: Dong, Ling, et al.
Publicado: (2012) -
Physical-Layer Security for Cooperative Relay Networks
por: Zou, Yulong, et al.
Publicado: (2016) -
Information Technology: New Generations 13th International Conference on Information Technology /
Publicado: (2016)