Login / Signup
Mobile Security and Trusted Computing (Mobile Sicherheit und vertrauenswürdiges Rechnen).
Chris J. Mitchell
Published in:
it Inf. Technol. (2006)
Keyphrases
</>
trusted computing
computing environments
mobile devices
mobile computing
response time
mobile networks
computer security
information systems
security issues
factor authentication