 |
Bluetooth Core Specification v5.1 Feature Overview A summary and explanation of the changes and new features introduced in the Bluetooth Core Specification version 5.1, including Direction Finding, GATT Caching Enhancements, Randomized Advertising Channel Indexing, Periodic Advertising Sync Transfer, and various minor enhancements. |
 |
Bluetooth 5.3 Core Specification Feature Enhancements This document details the feature enhancements introduced in the Bluetooth Core Specification Version 5.3, including Periodic Advertising Enhancement, Encryption Key Size Control Enhancement, Connection Subrating, and Channel Classification Enhancement. |
 |
Bluetooth 5: Go Faster, Go Further An overview of Bluetooth 5's advancements, including increased range, speed, and broadcast messaging capacity, and their impact on smart home automation, enterprise, and industrial markets. |
 |
Bluetooth Core Specification Version 5.2 Feature Overview This document summarizes and explains the three primary updates introduced in the Bluetooth Core Specification version 5.2, focusing on Enhanced Attribute Protocol (EATT), LE Power Control, and LE Isochronous Channels. |
 |
Bluetooth 4.1 Quick Reference Guide A quick reference guide to the features and benefits of Bluetooth 4.1, highlighting improvements in usability, developer innovation, and its role in the Internet of Things. |
 |
Bluetooth Assigned Numbers Document This document provides a comprehensive list of assigned numbers, codes, and identifiers used within the Bluetooth specifications. It is regularly updated and serves as a key reference for developers and implementers of Bluetooth technology. |
 |
Bluetooth Simple Pairing Whitepaper This whitepaper provides an overview of the cryptographic procedures and algorithms for the Simple Pairing feature in the Lisbon release of the Bluetooth Core Specification, aimed at the security community for peer review. |
 |
Understanding Bluetooth Vulnerabilities: A Deep Dive Explore the security aspects of Bluetooth technology, including its protocols, common vulnerabilities, and attack vectors. This presentation from Hack.lu 2006 by Kevin Finistere and Thierry Zoller provides an in-depth look at Bluetooth's strengths and weaknesses. |