Trusted mobile platforms

  • Authors:
  • E. Gallery;C. J. Mitchell

  • Affiliations:
  • Royal Holloway, University of London, Egham, Surrey, United Kingdom;Royal Holloway, University of London, Egham, Surrey, United Kingdom

  • Venue:
  • Foundations of security analysis and design IV
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

This article addresses two main topics. Firstly, we review the operation of trusted computing technology, which now appears likely to be implemented in future mobile devices (including mobile phones, PDAs, etc.). Secondly, we consider the possible applications of this technology in mobile devices, and how these applications can be supported using trusted computing technology. We focus in particular on three mobile applications, namely OMA DRM, SIMLock, and software download.