University of Kuopio

Displaying 1-2 of 2 results

  • White Papers // Mar 2009

    Secure Identity Management and Mobile Payments Using Hand-Held Devices JOKA KUOPIO 2009

    Identity proofs play an important role in the lives. They are performed both in face-to-face situations and remotely via computer networks. With the recent switch to new electronic identity paper such as biometric passports and chip-based identity cards, an increasing proportion of identity proofs takes place in the electronic realm....

    Provided By University of Kuopio

  • White Papers // Dec 2008

    Security Threats and Countermeasures in Bluetooth-Enabled Systems

    Bluetooth is a technology for short range wireless data and realtime two-way voice transfer providing data rates up to 3 Mb/s. It can be used to connect almost any device to another device. Bluetooth-enabled devices, such as mobile phones, headsets, PCs, laptops, printers, mice, and keyboards, are widely used all...

    Provided By University of Kuopio

  • White Papers // Dec 2008

    Security Threats and Countermeasures in Bluetooth-Enabled Systems

    Bluetooth is a technology for short range wireless data and realtime two-way voice transfer providing data rates up to 3 Mb/s. It can be used to connect almost any device to another device. Bluetooth-enabled devices, such as mobile phones, headsets, PCs, laptops, printers, mice, and keyboards, are widely used all...

    Provided By University of Kuopio

  • White Papers // Mar 2009

    Secure Identity Management and Mobile Payments Using Hand-Held Devices JOKA KUOPIO 2009

    Identity proofs play an important role in the lives. They are performed both in face-to-face situations and remotely via computer networks. With the recent switch to new electronic identity paper such as biometric passports and chip-based identity cards, an increasing proportion of identity proofs takes place in the electronic realm....

    Provided By University of Kuopio