Allayla - Google Patents
Provide Simple Protection for Bluetooth Connection in Wireless Personal Area NetworkAllayla
View PDF- Document ID
- 14024041203193947814
- Author
- Allayla M
External Links
Snippet
The using of the mobile device can increase productivity and responsiveness to costumers. Once equipped with a mobile device, users are no longer limited by the constraints of a work day; anytime, anywhere access to enterprise information that can processed, acted upon …
- 238000005516 engineering process 0 abstract description 16
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Miller | Facing the challenge of wireless security | |
| Shen et al. | Secure device-to-device communications over WiFi direct | |
| Jakobsson et al. | Security weaknesses in Bluetooth | |
| JP4504192B2 (en) | Secure access to subscription modules | |
| KR100832893B1 (en) | A method for the access of the mobile terminal to the WLAN and for the data communication via the wireless link securely | |
| EP1569411B1 (en) | Methods, apparatuses and program products for initializing a security association based on physical proximity in a wireless ad-hoc network | |
| JP2003309558A (en) | Method for authenticating communication on network medium | |
| Zhu et al. | PrudentExposure: A private and user-centric service discovery protocol | |
| Gehrmann et al. | Enhancements to Bluetooth baseband security | |
| Hager et al. | Demonstrating vulnerabilities in bluetooth security | |
| JP2006109449A (en) | Access point that wirelessly provides encryption key to authenticated wireless station | |
| Firdus et al. | WiFi from past to today, consequences that can cause and measures of prevention from them, WiFi security protocols | |
| Panse et al. | A review on security mechanism of Bluetooth communication | |
| Feeney et al. | Spontnet: Experiences in configuring and securing small ad hoc networks | |
| Träskbäck | Security of bluetooth: An overview of bluetooth security | |
| Jeong et al. | An integrated security framework for open wireless networking architecture | |
| Vanhala | Security in ad hoc networks | |
| Nanda et al. | A novel hybrid authentication model for geo location oriented routing in dynamic wireless mesh networks | |
| Allayla | Provide Simple Protection for Bluetooth Connection in Wireless Personal Area Network | |
| Hasan | Provide Simple Protection for Bluetooth Connection in Wireless Personal Area Network | |
| Lu et al. | A novel smart card based user authentication and key agreement scheme for heterogeneous wireless sensor networks | |
| Agrawal et al. | Secure mobile computing | |
| Abbood et al. | Intelligent hybrid technique to secure bluetooth communications | |
| Othman et al. | Developing a secure mechanism for Bluetooth-based wireless personal area networks (WPANs) | |
| Lee | Bluetooth security protocol analysis and improvements |