Mobile security and trusted computing

Chris J. Mitchell

(2006)

Chris J. Mitchell (2006) Mobile security and trusted computing. Information Technology, 48

Our Full Text Deposits

Full text access: Open

Full Text - 103.75 KB

Links to Copies of this Item Held Elsewhere


Abstract

Some of the most significant security issues arising in the context of ubiquitous mobile computing are reviewed. Emerging technologies which may be able to help overcome these security problems are also described; in particular we consider methods for secure 'imprinting' of mobile devices, techniques proposed for establishing trust between devices with no prior relationship, and finally the relevence of trusted computing technology to mobile security issues.

Information about this Version

This is a Published version
This version's date is: 2006
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/6e971203-6cb9-0cb1-fd0e-3bcf1b7fee35/1/

Item TypeJournal Article
TitleMobile security and trusted computing
AuthorsMitchell, Chris
Uncontrolled KeywordsSecurity, mobility, ubiquitous computing, trusted computing
DepartmentsFaculty of Science\Mathematics

Identifiers

Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010

Notes

This is the final draft version of the paper that appeared in the journal 'Information Technology', 48, 2006. This article is also available in German.


Details