000 01067 a2200229 4500
003 Nust
005 20220726122909.0
010 _a 2004049721
020 _a1580535046
040 _cNust
082 0 0 _a005.8.GEH
100 1 _aGehrmann, Christian.
_995181
245 1 0 _aBluetooth security /
_cChristian Gehrmann, Joakim Persson, Ben Smeets.
260 _aBoston :
_bArtech House,
_cc2004.
300 _axii, 204 p. :
_bill. ;
_c24 cm.
440 0 _aArtech House computer security series
_995054
505 _aIntroduction (Page-3), Overview of The Bluetooth Security Architecture (Page-27), Bluetooth Pairing and Key Management (Page-43), Algorithms (Page-65), Broadcast Encryption (Page-81), Security Policies and Access Control (Page-87), Attacks, Strengths and Weaknesses (Page-97), Providing Anonymity (Page-123), Key Management Extensions (Page-139), Security for Bluetooth Applications (Page-167).
650 0 _aBluetooth technology
_xSecurity measures.
_995182
700 1 _aPersson, Joakim.
_995183
700 1 _aSmeets, Ben.
_995184
942 _cREF
_2ddc
999 _c175317
_d175317