|
Volumn , Issue , 2008, Pages 182-186
|
Bluetooth security in wearable computing applications
a a a |
Author keywords
Authentication; Bluetooth security; Encryptionmatr; Wearable computing; wireless sensor networking
|
Indexed keywords
ADDRESSING SCHEME;
BEST PRACTICE;
BLUETOOTH ARCHITECTURES;
BLUETOOTH DEVICE;
BLUETOOTH PROTOCOL;
BLUETOOTH TECHNOLOGY;
DATA COLLECTION;
ENCRYPTIONMATR;
REAL TIME ANALYSIS;
SECURITY ISSUES;
SPECIALIZED TECHNOLOGIES;
WEARABLE COMPUTING;
WIRELESS COMPUTING SYSTEMS;
WIRELESS SENSOR;
WIRELESS SENSOR NETWORKING;
AUTHENTICATION;
CELLULAR TELEPHONE SYSTEMS;
CRYPTOGRAPHY;
LITHIUM BATTERIES;
NETWORK SECURITY;
OPTICAL MATERIALS;
REAL TIME SYSTEMS;
SENSORS;
TECHNOLOGY;
WEARABLE COMPUTERS;
WIRELESS NETWORKS;
WIRELESS TELECOMMUNICATION SYSTEMS;
BLUETOOTH;
|
EID: 67649866280
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/HONET.2008.4810232 Document Type: Conference Paper |
Times cited : (40)
|
References (4)
|