BITS: a smartcard protected operating system
Communications of the ACM
Security in computing
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Computer security
Architectural support for copy and tamper resistant software
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
A trusted process to digitally sign a document
Proceedings of the 2001 workshop on New security paradigms
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Improving the TCPA Specification
Computer
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
AEGIS: architecture for tamper-evident and tamper-resistant processing
ICS '03 Proceedings of the 17th annual international conference on Supercomputing
Computer
Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks?
IEEE Security and Privacy
Cryptography and competition policy: issues with 'trusted computing'
Proceedings of the twenty-second annual symposium on Principles of distributed computing
A secure and reliable bootstrap architecture
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
Xen and the art of virtualization
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Architectural support for copy and tamper-resistant software
Architectural support for copy and tamper-resistant software
Proceedings of the 11th ACM conference on Computer and communications security
User's Guide To Cryptography And Standards (Artech House Computer Security)
User's Guide To Cryptography And Standards (Artech House Computer Security)
How Trusted Computers can Enhance for Privacy Preserving Mobile Applications
WOWMOM '05 Proceedings of the First International IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing - Volume 03
Trusted Computing Platforms: TCPA Technology in Context
Trusted Computing Platforms: TCPA Technology in Context
A secure modular mobile agent system
Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems
Flexible OS support and applications for trusted computing
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Final fantasy: securing on-line gaming with trusted computing
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Cooperative and non-cooperative game-theoretic analyses of adoptions of security policies for DRM
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Defining trust evidence: research directions
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Hi-index | 0.00 |
This article addresses two main topics. Firstly, we review the operation of trusted computing technology, which now appears likely to be implemented in future mobile devices (including mobile phones, PDAs, etc.). Secondly, we consider the possible applications of this technology in mobile devices, and how these applications can be supported using trusted computing technology. We focus in particular on three mobile applications, namely OMA DRM, SIMLock, and software download.