{"entities":{"Q4467":{"pageid":27588,"ns":120,"title":"Item:Q4467","lastrevid":85769,"modified":"2020-04-14T07:26:38Z","type":"item","id":"Q4467","labels":{"en":{"language":"en","value":"Guide to bluetooth security"}},"descriptions":{"en":{"language":"en","value":"National Institute and Standart Technology report published in 2017"}},"aliases":{},"claims":{"P3":[{"mainsnak":{"snaktype":"value","property":"P3","datavalue":{"value":{"entity-type":"item","numeric-id":2527,"id":"Q2527"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4467$C9BCABA6-DCCA-4A1E-AB66-020C70982988","rank":"normal"}],"P15":[{"mainsnak":{"snaktype":"value","property":"P15","datavalue":{"value":"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-121r2.pdf","type":"string"},"datatype":"url"},"type":"statement","id":"Q4467$A554987B-C6D6-4711-B719-C575B428ED3B","rank":"normal"}],"P100":[{"mainsnak":{"snaktype":"value","property":"P100","datavalue":{"value":{"time":"+2017-05-00T00:00:00Z","timezone":0,"before":0,"after":0,"precision":10,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q4467$a293e473-41f7-3533-2b72-1c5cd2519d3c","rank":"normal"}],"P62":[{"mainsnak":{"snaktype":"value","property":"P62","datavalue":{"value":"10.6028/NIST.SP.800-121r2","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q4467$1b2f1352-4148-0e3d-71ee-def1d5013b70","rank":"normal"}],"P110":[{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4406,"id":"Q4406"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4467$c7c47cbf-43be-912a-dba1-43df67794187","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":2587,"id":"Q2587"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4467$4e0b739b-4f69-d3bd-5f5d-894f233e3737","rank":"normal"}],"P203":[{"mainsnak":{"snaktype":"value","property":"P203","datavalue":{"value":"P27 Security Features of Bluetooth Low Energy |p47 Bluetooth Vulnerabilities","type":"string"},"datatype":"string"},"type":"statement","id":"Q4467$460e57ca-4f0c-e7be-3fcf-7cf90015edd7","rank":"normal"}]},"sitelinks":{}}}}