New Techniques for Trustworthy Mobile Computing