Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/9913
Full metadata record
DC FieldValueLanguage
dc.contributor.authorIsmaila, Idris-
dc.contributor.authorMorufu, O.-
dc.date.accessioned2021-07-16T11:08:39Z-
dc.date.available2021-07-16T11:08:39Z-
dc.date.issued2011-08-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/9913-
dc.description.abstractBefore implementing some new technologies, a simulation program is usually designed to first demonstrate how the technology works. If it works perfectly, then the real implementation takes place, but if it fails, correction is made before the implementation. In this paper, we shall examine a program that demonstrates security application in Bluetooth technology. We shall also discuss how Bluetooth technology provides security measures at both the application layer and the data link layer. Finally we look at the two kinds of inherent features that make attacks more difficult.en_US
dc.language.isoenen_US
dc.publisherJournal of Science, Technology, Mathematics and Education (JOSTMED)en_US
dc.relation.ispartofseries;3-
dc.subjectBluetooth, Security, Network, Protocol, Applicationen_US
dc.titleSecurity Application In Bluetooth Technologyen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
ismaila and olalere 2011_security application.pdfSECURITY APPLICATION IN BLUETOOTH TECHNOLOGY110.45 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.