透過您的圖書館登入
IP:3.22.249.158

摘要


In this article, we will introduce the concept of bluetooth and bluetooth infrastructure; the concept of bluetooth security. We also put forward some requirements and criteria for designing a secure bluetooth protocols. We also introduced the topology used for blueooth communication systems and the types of bluetooth security protocols.

延伸閱讀