Mobile security and trusted computing

Mitchell, Chris J

(2006)

Mitchell, Chris J (2006) Mobile security and trusted computing. Information Technology, 48

Our Full Text Deposits

Full text access: Open

Full Text - 103.75 KB

Links to Copies of this Item Held Elsewhere


Abstract

Some of the most significant security issues arising in the context of ubiquitous mobile computing are reviewed. Emerging technologies which may be able to help overcome these security problems are also described; in particular we consider methods for secure 'imprinting' of mobile devices, techniques proposed for establishing trust between devices with no prior relationship, and finally the relevence of trusted computing technology to mobile security issues.

Information about this Version

This is a Submitted version
This version's date is: 2006
This item is not peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/6e971203-6cb9-0cb1-fd0e-3bcf1b7fee35/6/

Item TypeJournal Article
TitleMobile security and trusted computing
AuthorsMitchell, Chris J
Uncontrolled KeywordsSecurity, mobility, ubiquitous computing, trusted computing
Departments

Identifiers

Deposited by Research Information System (atira) on 06-Oct-2012 in Royal Holloway Research Online.Last modified on 06-Oct-2012

Notes

This is the final draft version of the paper that appeared in the journal 'Information Technology', 48, 2006. This article is also available in German.


Details