Mobile security and trusted computing

Research output: Contribution to journalArticlepeer-review

57 Downloads (Pure)
Original languageEnglish
Pages (from-to)321-326
JournalInformation Technology
Volume48
Publication statusPublished - 2006

Keywords

  • Security
  • mobility
  • ubiquitous computing
  • trusted computing

Cite this