Related Books
Language: en
Pages: 89
Pages: 89
Type: BOOK - Published: 2013-08-13 - Publisher: Springer Science & Business Media
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device
Language: en
Pages: 350
Pages: 350
Type: BOOK - Published: 2012-06-09 - Publisher: Springer
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in J
Language: en
Pages: 110
Pages: 110
Type: BOOK - Published: 2013-12-01 - Publisher: Morgan & Claypool Publishers
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smart
Language: en
Pages: 325
Pages: 325
Type: BOOK - Published: 2011-06-15 - Publisher: Springer
This book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST 2011, held in Pittsburgh, PA, USA i
Language: en
Pages: 290
Pages: 290
Type: BOOK - Published: 2013-06-12 - Publisher: Springer
This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2