Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections
暂无分享,去创建一个
[1] Hamid R. Nemati. International Journal of Information Security and Privacy , 2007 .
[2] Jun Zheng,et al. Handbook of Research on Wireless Security , 2008 .
[3] Joseph Migga Kizza. Securing the information infrastructure , 2007 .