Using trusted computing to secure mobile ubiquitous environments

Leung, Adrian, Yau, Po-Wah and Mitchell, Chris

(2009)

Leung, Adrian, Yau, Po-Wah and Mitchell, Chris (2009) Using trusted computing to secure mobile ubiquitous environments
In: Security and Privacy in Mobile & Wireless Networking. Troubador.

Our Full Text Deposits

Full text access: Open

Full text file - 945.54 KB

Abstract

Information about this Version

This is a Submitted version
This version's date is: 2009
This item is not peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/1c756b8c-a8d5-27a3-7a27-c9ed96458e3a/3/

Item TypeBook Item
TitleUsing trusted computing to secure mobile ubiquitous environments
AuthorsLeung, Adrian
Yau, Po-Wah
Mitchell, Chris
DepartmentsFaculty of Science\Mathematics

Identifiers

Deposited by Research Information System (atira) on 19-Sep-2012 in Royal Holloway Research Online.Last modified on 19-Sep-2012


Details