Login / Signup

Protecting the integrity of trusted applications in mobile phone systems.

Divya MuthukumaranJoshua SchiffmanMohamed HassanAnuj SawaniVikhyath RaoTrent Jaeger
Published in: Secur. Commun. Networks (2011)
Keyphrases
  • mobile phone
  • mobile devices
  • cellular phone
  • mobile applications
  • smart phones
  • mobile learning
  • data protection
  • mobile users