BLE v4.2: Creating Faster, More Secure, Power-Efficient Designs—Part 4 (.PDF Download)

Dec. 14, 2016

In Part 3 of this series, we discussed security requirements in wireless systems. Part 4 explores the pairing process used to establish an environment for the secure transmission of data. Pairing is the process of key exchange and authentication...

Register or Sign in below to download the full article in .PDF format, including high-resolution graphics and schematics when applicable.

Sponsored

Explore Raspberry Pi’s imaging and AI tools in this free webinar with expert insights from Naushir Patuck. Register now to attend live or watch the recording later.
TE Connectivity AMP’s mezzanine connectors include Micro MaTch, Free Height & MICTOR SB connectors all available at Digi-Key. Same day shipping!
Whether you’re a beginner or an enthusiast, our free pocket guide, spanning roughly 60 pages, offers a broad insight into satellite technologies in one handy place. From clear...
This white paper describes the basic functionality of antennas. Starting with Hertz's Antenna model followed by a short introduction to the fundamentals of wave propagation, the...