Login / Signup
An integrity-based mechanism for accessing keys in a mobile trusted module.
Daewon Kim
Jeongnyeo Kim
Hyunsook Cho
Published in:
ICTC (2013)
Keyphrases
</>
trusted computing
mobile devices
mobile phone
computing environments
mobile environments
databases
integrity constraints
mobile applications
mobile users
smart phones
mobile computing
mobile services