The Untapped Potential of Trusted Execution Environments on Mobile Devices
暂无分享,去创建一个
[1] N. Asokan,et al. On-board credentials with open provisioning , 2009, ASIACCS '09.
[2] N. Asokan,et al. Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures , 2011, CODASPY '11.
[3] N. Asokan,et al. Practical Property-Based Attestation on Mobile Devices , 2011, TRUST.
[4] Jan-Erik Ekberg,et al. Mass Transit Ticketing with NFC Mobile Phones , 2011, INTRUST.
[5] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[6] Jan-Erik Ekberg,et al. Securing Software Architectures for Trusted Processor Environments , 2013 .
[7] Xiaoxin Chen,et al. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems , 2008, ASPLOS.
[8] Kari Kostiainen,et al. On-board Credentials: An open credential platform for mobile devices , 2012 .