Secure key management in a trusted domain on mobile devices
As mobile devices manage more and more sensitive information they have become a more targeted platform to exploit. To maintain system integrity while providing a highly responsive product, platform developers have developed hardware as well as software solutions to improve security. Until recently h...
Main Author: | Solsjö, Oskar |
---|---|
Format: | Others |
Language: | English |
Published: |
Linköpings universitet, Databas och informationsteknik
2015
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-118501 |
Similar Items
-
Quick Boot of Trusted Execution Environment With Hardware Accelerators
by: Trong-Thuc Hoang, et al.
Published: (2020-01-01) -
Conservative management for iatrogenic gastric perforation by transesophageal echocardiography
by: Masaya Oshiro, et al.
Published: (2018-06-01) -
Hardware Root of Trust for Linux Based Edge Gateway
by: Al-Galby, Mohamed, et al.
Published: (2018) -
Safety of Appendices of Mobile Payments with Applying TPM Mobile
by: Evgeniya Alekseevna Lagutina
Published: (2013-09-01) -
Integral model of maintenance management based on TPM and RCM principles to increase machine availability in a manufacturing company
by: Moscoso, Carlos, et al.
Published: (2021)