Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures /
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literatur...
| Main Authors: | Haataja, Keijo (Author), Hyppönen, Konstantin (Author), Pasanen, Sanna (Author), Toivanen, Pekka (Author) |
|---|---|
| Corporate Author: | SpringerLink (Online service) |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2013.
|
| Series: | SpringerBriefs in Computer Science,
|
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Similar Items
-
Insider Attack and Cyber Security Beyond the Hacker /
Published: (2008) -
Power Analysis Attacks Revealing the Secrets of Smart Cards /
by: Mangard, Stefan, et al.
Published: (2007) -
Smart Cards, Tokens, Security and Applications
Published: (2017) -
Voice over IP Security A Comprehensive Survey of Vulnerabilities and Academic Research /
by: Keromytis, Angelos D.
Published: (2011) -
Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings /
Published: (2009)