Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/1718
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Vashi, Devendra I. | - |
dc.contributor.author | Brahmabhatt, Divya | - |
dc.contributor.author | Jungi, Kamesh | - |
dc.date.accessioned | 2010-11-02T11:36:39Z | - |
dc.date.available | 2010-11-02T11:36:39Z | - |
dc.date.issued | 2009-05-11 | - |
dc.identifier.citation | International Conference On Security and Identity Management (SIM) – 2009, Indian Institute of Management Ahmedabad, May 11-12, 2009, Page No. 1-6 | en |
dc.identifier.uri | http://hdl.handle.net/123456789/1718 | - |
dc.description.abstract | Bluetooth has shown promise as a wireless ad hoc networking protocol and will only continue to spread as more and more consumers cut the wires from their everyday lives. On the other side of the coin, Bluetooth has also shown the difficulties and pitfalls that exist when implementing a network such as this. Clearly, Bluetooth is not a perfect standard in any way, but it is a step in the right direction. It will be interesting to see what changes and improvements come about in future implementations of Bluetooth. For now, Bluetooth offers convenience and access to a broader base of information, but one must remember that there are people out there with malicious intent, and they can violate Bluetooth security. As long as everyone is aware of this and does their best to maintain some security, then Bluetooth can act as a sufficient step towards a world of secure ad hoc networks. | en |
dc.relation.ispartofseries | ITFCA008-1 | en |
dc.subject | Computer Faculty Paper | en |
dc.subject | Faculty Paper | en |
dc.subject | ITFCA008 | en |
dc.title | Overview, Working style and Safety Measures for Bluetooth Hacking | en |
dc.type | Faculty Papers | en |
Appears in Collections: | Faculty Papers, CE |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ITFCA008-1.pdf | ITFCA008-1 | 274.24 kB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.