|
Volumn 2, Issue 1, 2003, Pages 21-29
|
Hardware implementation of bluetooth security
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTER ARCHITECTURE;
COMPUTER SOFTWARE;
CRYPTOGRAPHY;
DATA PRIVACY;
MOBILE COMPUTING;
NETWORK PROTOCOLS;
PUBLIC POLICY;
RANDOM ACCESS STORAGE;
BLUETOOTH SECURITY;
MOBILE DEVICES;
PERVASIVE COMPUTING;
SECURITY POLICIES;
SECURITY OF DATA;
|
EID: 3042720550
PISSN: 15361268
EISSN: None
Source Type: Journal
DOI: 10.1109/MPRV.2003.1186722 Document Type: Article |
Times cited : (28)
|
References (10)
|