Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/4362
Full metadata record
DC FieldValueLanguage
dc.contributor.authorOlalere, Morufu-
dc.contributor.authorIsmaila, Idris-
dc.date.accessioned2021-06-22T13:30:07Z-
dc.date.available2021-06-22T13:30:07Z-
dc.date.issued2011-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/4362-
dc.description.abstractBefore implementing some new technologies, a simulation program is usually designed to first demonstrate how the technology works. If it works perfectly, then the real implementation takes place, but if it fails, correction is made before the implementation. In this paper, we shall examine a program that demonstrates security application in Bluetooth technology. We shall also discuss how Bluetooth technology provides security measures at both the application layer and the data link layer. Finally we look at the two kinds of inherent features that make attacks more difficult.en_US
dc.language.isoenen_US
dc.relation.ispartofseriesVol. 7: 3;-
dc.subjectBluetoothen_US
dc.subjectSecurityen_US
dc.subjectNetworken_US
dc.subjectProtocolen_US
dc.subjectApplicationen_US
dc.titleSecurity Application in Bluetooth Technologyen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
ismaila and olalere 2011_security application.pdf110.45 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.