<--- Back to Details
First PageDocument Content
Security / Symbian / Trusted Execution Technology / Windows Mobile / Java Platform /  Micro Edition / Vulnerability / S60 / Mobile virus / Operating system / Computing / Computer security / Smartphones
Date: 2008-09-19 08:36:05
Security
Symbian
Trusted Execution Technology
Windows Mobile
Java Platform
Micro Edition
Vulnerability
S60
Mobile virus
Operating system
Computing
Computer security
Smartphones

Trusted Execution Environment

Add to Reading List

Source URL: www.trusted-logic.com

Download Document from Source Website

File Size: 551,13 KB

Share Document on Facebook

Similar Documents

Anti-Virus Comparative Mobile Security Review 2016 Language: English September 2016 Last Revision: 25th September 2016

DocID: 1tEYC - View Document

 > BE Taiwan 9 > Une nouvelle puce anti-virus pour les appareils de communication mobile

DocID: 1sP8A - View Document

Biology / Medicine / Dengue fever / Vaccination / Biological engineering / Biotechnology / Immune system / Interferon / Vaccine / Dengue vaccine / Dengue virus / Stimulator of interferon genes

Issue 1, 2016 October – December 2015 Pinpointing the genetic basis of disease [p26] Scientific recognition for mobile app developers [p38]

DocID: 1r48t - View Document

Software / Computer security / System software / Antivirus software / Computer virus / Malware / Zero-day / Intrusion detection system / Clam AntiVirus / Bitdefender / Mobile security / Avira

CloudAV: N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 48109 {jonojono, emcooke, farnam}@

DocID: 1r1LA - View Document

Computer security / Software / Cyberwarfare / Mobile Malware / Smartphones / Mobile security / Malware / Android / Computer virus / Google Play / DroidKungFu / Antivirus software

Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets Yajin Zhou Zhi Wang Wu Zhou Xuxian Jiang Department of Computer Science North Carolina State University {yajin zhou,zhi

DocID: 1qGlF - View Document