Managing Bluetooth Security
E. Eugene Schultz, Matthew W. A. Pemble, and Wendy Goucher
Mobile computing technology has been one of the true revolutions of the early twenty-first century. One of the most popular technologies within the mobile computing arena is Bluetooth technology, which allows different devices to connect to one other without complications such as having to manually synchronize them with each other. Like any other type of mobile technology, Bluetooth has a number of inherent security vulnerabilities that give rise to ...