Brush up on Bluetooth

This paper will attempt to provide a basic understanding of what Bluetooth is and how it works. It will then describe the critical elements of Bluetooth security as well as potential security weaknesses. Finally, it will provide some guidelines for using Bluetooth securely.
By Jeffrey Hall
October 9, 2003

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg