Trusted Hart for Mobile RISC-V Security.
Vladimir UshakovSampo SovioQingchao QiVijayanand NayaniValentin ManeaPhilip GinzboorgJan-Erik EkbergPublished in: CoRR (2022)
Keyphrases
- network connection
- trusted computing
- mobile commerce
- mobile phone
- computing environments
- access control
- intrusion detection
- information security
- mobile devices
- security requirements
- security policies
- security issues
- application specific
- mobile applications
- context aware
- mobile technologies
- network security
- network access
- security mechanisms
- key management
- mobile payment
- mobile internet
- distributed environment
- ad hoc networking
- trusted platform module
- cloud computing
- trust relationships
- instruction set
- hardware architecture
- mobile services
- mobile environments
- mobile networks
- mobile computing