Login / Signup

An integrity-based mechanism for accessing keys in a mobile trusted module.

Daewon KimJeongnyeo KimHyunsook Cho
Published in: ICTC (2013)
Keyphrases
  • trusted computing
  • mobile devices
  • mobile phone
  • computing environments
  • mobile environments
  • databases
  • integrity constraints
  • mobile applications
  • mobile users
  • smart phones
  • mobile computing
  • mobile services