Please use this identifier to cite or link to this item:
http://repository.futminna.edu.ng:8080/jspui/handle/123456789/4362
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Olalere, Morufu | - |
dc.contributor.author | Ismaila, Idris | - |
dc.date.accessioned | 2021-06-22T13:30:07Z | - |
dc.date.available | 2021-06-22T13:30:07Z | - |
dc.date.issued | 2011 | - |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/4362 | - |
dc.description.abstract | Before implementing some new technologies, a simulation program is usually designed to first demonstrate how the technology works. If it works perfectly, then the real implementation takes place, but if it fails, correction is made before the implementation. In this paper, we shall examine a program that demonstrates security application in Bluetooth technology. We shall also discuss how Bluetooth technology provides security measures at both the application layer and the data link layer. Finally we look at the two kinds of inherent features that make attacks more difficult. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartofseries | Vol. 7: 3; | - |
dc.subject | Bluetooth | en_US |
dc.subject | Security | en_US |
dc.subject | Network | en_US |
dc.subject | Protocol | en_US |
dc.subject | Application | en_US |
dc.title | Security Application in Bluetooth Technology | en_US |
dc.type | Article | en_US |
Appears in Collections: | Cyber Security Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ismaila and olalere 2011_security application.pdf | 110.45 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.