作者
Paraskevas Kitsos, Nicolas Sklavos, Kyriakos Papadomanolakis, Odysseas Koufopavlou
发表日期
2003/1
期刊
IEEE Pervasive Computing
卷号
2
期号
1
页码范围
21-29
出版商
IEEE
简介
Bluetooth can implement its security layer's key-generation mechanism and authentication in software or hardware. Software implementation usually satisfies user requirements, but in time-critical applications or processing-constrained devices, a hardware implementation is preferable.
引用总数
20032004200520062007200820092010201120122013201420152016201720182019202020212022202327124183616423352661
学术搜索中的文章
P Kitsos, N Sklavos, K Papadomanolakis… - IEEE Pervasive Computing, 2003
P Kitsos, N Sklavos, K Papadomanolakis…