Download Ebook Bluetooth Security
Author(s): Christian Gehrmann, Joakim Persson, Ben Smeets
Publisher: Artech House
Year: Jun 2004
ISBN: 1580535046
This cutting-edge resource examines all known attacks on Bluetooth security mechanisms and their implementations, demonstrating how some of these known weaknesses can be avoided with appropriate defensive measures. The book presents concrete examples of how to design security solutions for some Bluetooth applications and products built on these applications. You find real-world case studies including technical algorithms, mechanisms and protocols, and security architectures. These architectures offer valuable guidelines for use in building Bluetooth and non-Bluetooth-specific security mechanisms.
TABLE OF CONTENT:
Chapter 01 - Introduction
Chapter 02 - Overview Of The Bluetooth Security Architecture
Chapter 03 - Bluetooth Pairing And Key Management
Chapter 04 - Algorithms
Chapter 05 - Broadcast Encryption
Chapter 06 - Security Policies and Access Controls
Chapter 07 - Attacks, Strengths And Weaknesses
Chapter 08 - Providing Anonymity
Chapter 09 - Key Management Extensions
Chapter 10 - Security For Bluetooth Application
File type: PDF
Pages: 221
Size (for download): 0.7 MB
password:ganelon
No comments:
Post a Comment