![Computer network security / Computing / Security / Cyberwarfare / Bluetooth / Wireless / Medical device / Computer security / Man-in-the-middle attack / Bluesnarfing / Mobile security Computer network security / Computing / Security / Cyberwarfare / Bluetooth / Wireless / Medical device / Computer security / Man-in-the-middle attack / Bluesnarfing / Mobile security](https://www.pdfsearch.io/img/d17f8fc666096c90908c1e46de868c9e.jpg) Date: 2012-09-17 16:56:34Computer network security Computing Security Cyberwarfare Bluetooth Wireless Medical device Computer security Man-in-the-middle attack Bluesnarfing Mobile security | | Securing Legacy Mobile Medical Devices Vahab Pournaghshband, Majid Sarrafzadeh, and Peter Reiher Computer Science Department University of California, Los Angeles {vahab,majid,reiher}@cs.ucla.eduAdd to Reading ListSource URL: lasr.cs.ucla.eduDownload Document from Source Website File Size: 322,67 KBShare Document on Facebook
|