Hardware Intrinsic Security to Protect Value in the Mobile Market.
Vincent van der LeestRoel MaesGeert Jan SchrijenPim TuylsPublished in: ISSE (2014)
Keyphrases
- mobile payment
- data encryption
- low cost
- real time
- random number generator
- mobile commerce
- mobile phone
- access control
- trusted computing
- information security
- mobile services
- mobile devices
- camera phones
- business models
- mobile learning
- hardware and software
- computing environments
- intrusion detection
- online banking
- privacy enhancing
- security issues
- computing systems
- security requirements
- network access
- factor authentication
- statistical databases
- mobile networks
- network security
- hardware implementation
- decision making
- electronic commerce
- protection scheme
- unauthorized access
- mobile users
- service management
- data security
- mobile computing
- security policies
- data protection
- user privacy
- personal information
- handheld devices
- mobile applications
- computing platform
- context aware
- cloud computing
- computer systems