Abstract
As an interconnection technology, Bluetooth has to address all the traditional security problems, well known from distributed networks [25].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2013 The Author(s)
About this chapter
Cite this chapter
Haataja, K., Hyppönen, K., Pasanen, S., Toivanen, P. (2013). Comparative Analysis of Bluetooth Security Attacks. In: Bluetooth Security Attacks. SpringerBriefs in Computer Science. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40646-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-40646-1_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40645-4
Online ISBN: 978-3-642-40646-1
eBook Packages: Computer ScienceComputer Science (R0)