Return to Article Details Security of wireless keyboards: threats, vulnerabilities and countermeasures Download Download PDF