Trusted Hart for Mobile RISC-V Security.
Vladimir UshakovSampo SovioQingchao QiVijayanand NayaniValentin ManeaPhilip GinzboorgJan-Erik EkbergPublished in: TrustCom (2022)
Keyphrases
- network connection
- trusted computing
- information security
- mobile commerce
- access control
- mobile phone
- application specific
- intrusion detection
- mobile devices
- network security
- security issues
- computing environments
- mobile internet
- mobile learning
- security policies
- network access
- trust relationships
- service management
- trusted platform module
- security requirements
- key management
- mobile users
- instruction set
- computer security
- security analysis
- security protocols
- mobile applications
- distributed environment
- operating system
- context aware
- factor authentication
- general purpose