This article addresses two main topics. Firstly, we review the operation of trusted computing technology, which now appears likely to be implemented in future mobile devices (inclu...
— In its recently published TCG Mobile Reference Architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpo...
Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Privacy and security has been considered as the top criterion for the acceptance of e-service adoption. In this paper, we proposed a privacy aware identity protection design that i...