Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/1718
Full metadata record
DC FieldValueLanguage
dc.contributor.authorVashi, Devendra I.-
dc.contributor.authorBrahmabhatt, Divya-
dc.contributor.authorJungi, Kamesh-
dc.date.accessioned2010-11-02T11:36:39Z-
dc.date.available2010-11-02T11:36:39Z-
dc.date.issued2009-05-11-
dc.identifier.citationInternational Conference On Security and Identity Management (SIM) – 2009, Indian Institute of Management Ahmedabad, May 11-12, 2009, Page No. 1-6en
dc.identifier.urihttp://hdl.handle.net/123456789/1718-
dc.description.abstractBluetooth has shown promise as a wireless ad hoc networking protocol and will only continue to spread as more and more consumers cut the wires from their everyday lives. On the other side of the coin, Bluetooth has also shown the difficulties and pitfalls that exist when implementing a network such as this. Clearly, Bluetooth is not a perfect standard in any way, but it is a step in the right direction. It will be interesting to see what changes and improvements come about in future implementations of Bluetooth. For now, Bluetooth offers convenience and access to a broader base of information, but one must remember that there are people out there with malicious intent, and they can violate Bluetooth security. As long as everyone is aware of this and does their best to maintain some security, then Bluetooth can act as a sufficient step towards a world of secure ad hoc networks.en
dc.relation.ispartofseriesITFCA008-1en
dc.subjectComputer Faculty Paperen
dc.subjectFaculty Paperen
dc.subjectITFCA008en
dc.titleOverview, Working style and Safety Measures for Bluetooth Hackingen
dc.typeFaculty Papersen
Appears in Collections:Faculty Papers, CE

Files in This Item:
File Description SizeFormat 
ITFCA008-1.pdfITFCA008-1274.24 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.