Leung, Adrian, Yau, Po-Wah and Mitchell, Chris (2009) Using trusted computing to secure mobile ubiquitous environments In: Security and Privacy in Mobile & Wireless Networking. Troubador.
Full text access: Open
This is a Submitted version This version's date is: 2009 This item is not peer reviewed
https://repository.royalholloway.ac.uk/items/1c756b8c-a8d5-27a3-7a27-c9ed96458e3a/5/
Deposited by Research Information System (atira) on 27-Jan-2013 in Royal Holloway Research Online.Last modified on 27-Jan-2013