Mitchell, Chris J (2006) Mobile security and trusted computing. Information Technology, 48
Full text access: Open
Some of the most significant security issues arising in the context of ubiquitous mobile computing are reviewed. Emerging technologies which may be able to help overcome these security problems are also described; in particular we consider methods for secure 'imprinting' of mobile devices, techniques proposed for establishing trust between devices with no prior relationship, and finally the relevence of trusted computing technology to mobile security issues.
This is a Submitted version This version's date is: 2006 This item is not peer reviewed
https://repository.royalholloway.ac.uk/items/6e971203-6cb9-0cb1-fd0e-3bcf1b7fee35/8/
Deposited by Research Information System (atira) on 01-Apr-2013 in Royal Holloway Research Online.Last modified on 01-Apr-2013
This is the final draft version of the paper that appeared in the journal 'Information Technology', 48, 2006. This article is also available in German.