This first-of-its-kind book, from expert authors actively contributing to the evolution of Bluetooth specifications, provides an overview and detailed descriptions of all the security functions and features of this standardOCOs latest core release. After categorizing all the security issues involved in ad hoc networking, this hands-on volume shows you how to design a highly secure Bluetooth system and implement security enhancements. The book also helps you fully understand the main security risks involved with introducing Bluetooth-based communications in your organization.qprocedures for short-range wireless communication, and the results directly apply to Bluetooth. ... Now, we will describe how to use manual interaction to make sure that the DH public values, g mod p and g mod p, come from a legitimateanbsp;...
|Author||:||Christian Gehrmann, Joakim Persson, Ben Smeets|
|Publisher||:||Artech House - 2004-01-01|