Implementation of a TCG-Based Trusted Computing in Mobile Device
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
A trust-based secure service discovery (TSSD) model for pervasive computing
Computer Communications
A Property-Dependent Agent Transfer Protocol
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Trusted Computing: Security and Applications
Cryptologia
Foundations of security analysis and design IV
Hi-index | 0.00 |
Trusted computing is designed to be a cheap, exportable and ubiquitous way of improving the security of personal, corporate and government data. This paper gives an introduction to how trusted computing can be relevant to mobile and pervasive computing and provides some examples of what can be done to enhance privacy and trust using (extensions of) this technology.