http://www.w3.org/ns/prov#value | - In the flow diagram of FIG. 6, the main or general steps are illustrated which are executed by the special application program in a Bluetooth device acting as slave in the system including also steps performed when a password such as a PIN is used.
|