It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_nuls

Record ID marc_nuls/NULS_PHC_180925.mrc:103818241:4576
Source marc_nuls
Download Link /show-records/marc_nuls/NULS_PHC_180925.mrc:103818241:4576?format=raw

LEADER: 04576cam 22003374a 4500
001 9921491260001661
005 20150423134906.0
008 040420s2004 maua b 001 0ceng
010 $a 2004049721
020 $a1580535046
035 $a(CSdNU)u224720-01national_inst
035 $a(OCoLC)55095428
035 $a(OCoLC)55095428
040 $aDLC$cDLC$dOrPss
042 $apcc
049 $aCNUM
050 00 $aTK5103.3$b.G44 2004
082 00 $a005.8$222
100 1 $aGehrmann, Christian.
245 10 $aBluetooth security /$cChristian Gehrmann, Joakim Persson, Ben Smeets.
260 $aBoston :$bArtech House,$cc2004.
300 $axii, 204 p. :$bill. ;$c24 cm.
440 0 $aArtech House computer security series
504 $aIncludes bibliographical references and index.
505 0 $aBluetooth system basics -- Trade-offs -- Bluetooth protocol stack -- Physical layer -- Baseband -- Link manager protocol -- Logical link control and adaptation protocol -- Host control interface -- Profiles -- User scenarios -- Overview of the Bluetooth Security Architecture -- Key types -- Pairing and user interaction -- Authentication -- Link privacy -- Protect the link -- Encryption algorithm -- Mode of operation -- Unicast and broadcast -- Communication security policies -- Security modes -- Security policy management -- Bluetooth Pairing and Key Management -- Pairing in Bluetooth -- HCI protocol -- LM protocol -- Baseband events -- Initialization key generation -- Unit key generation -- Combination key generation -- Authentication -- Master key generation -- User interaction -- Cipher key generation -- Encryption key K[subscript C] -- Constraint key K'[subscript C] -- Payload key K[subscript P] -- Key databases -- Unit keys generation requirements -- Combination key generation requirements -- Key databases -- Semipermanent keys for temporary use -- Algorithms -- Crypto algorithm selection -- Block ciphers -- Stream ciphers -- SAFER+ -- Authentication algorithm E[subscript 1] -- Unit key algorithm E[subscript 21] -- Initial key algorithm E[subscript 22] -- Encryption key algorithm E[subscript 3] -- Encryption engine -- Ciphering algorithm E[subscript 0] -- Initialization -- Implementation aspects -- Broadcast Encryption -- Preparing for broadcast encryption -- Switching to broadcast encryption -- Security Policies and Access Control -- Trust relations -- Security levels -- Flexibility -- Implementation considerations -- Security manager architecture -- Device trust level -- Security level for services -- Connection setup -- Database contents and registration procedure -- Attacks, Strengths, and Weaknesses -- Eavesdropping -- Impersonation -- Pairing -- Improper key storage -- Disclosure of keys -- Tampering with keys -- Denial of service -- Unit key -- Location tracking -- Bluetooth device address and location tracking -- Five different types of location tracking attacks -- Implementation flaws -- Bluetooth Security Enhancements -- Providing Anonymity -- Overview of the anonymity mode -- Address usage -- The fixed device address, BD_ADDR_fixed -- The active device address, BD_ADDR -- Alias addresses, BD_ADDR_alias -- Modes of operation -- Inquiry and paging -- Connectable mode -- Private connectable mode -- General connectable mode -- Alias authentication -- Pairing -- Anonymity mode LMP commands -- Address update, LMP active address -- Alias address exchange, LMP alias address -- Fixed address exchange, LMP fixed address -- Pairing example -- Key Management Extensions -- Improved pairing -- Requirements on an improved pairing protocol -- Improved pairing protocol -- Implementation aspects and complexity -- Higher layer key exchange -- IEEE 802.1x port-based network access control -- Higher layer key exchange with EAP TLS -- Autonomous trust delegation -- Security group extension method -- Public key-based key management -- Group extension method versus public key method -- Security for Bluetooth Applications -- Headset -- Headset security model -- Pass-key and key management -- Network access -- Common access keys -- Security architecture -- Network service subscription -- Initial connection -- Subsequent access to NAcPs -- SIM access -- The SIM access profile -- Securing SIM access.
650 0 $aBluetooth technology$xSecurity measures.
700 1 $aPersson, Joakim.
700 1 $aSmeets, Ben.
949 $aTK 5103.3 .G44 2004$i31786101836929
994 $a92$bCNU
999 $aTK 5103.3 .G44 2004$wLC$c1$i31786101836929$d8/12/2013$e8/12/2013 $kCHECKEDOUT$lCIRCSTACKS$mNULS$n9$q2$rM$sY$tBOOK$u9/1/2004