作者
Paraskevas Kitsos, Nicolas Sklavos, Kyriakos Papadomanolakis, Odysseas Koufopavlou
发表日期
2003/1
期刊
IEEE Pervasive Computing
卷号
2
期号
1
页码范围
21-29
出版商
IEEE
简介
Bluetooth can implement its security layer's key-generation mechanism and authentication in software or hardware. Software implementation usually satisfies user requirements, but in time-critical applications or processing-constrained devices, a hardware implementation is preferable.
引用总数
学术搜索中的文章
P Kitsos, N Sklavos, K Papadomanolakis… - IEEE Pervasive Computing, 2003