Trusted execution environment

Results: 16



#Item
1SECURITY TIPS FOR MOBILE BANKING  Tips to protect your information when using a mobile device to do your banking: • • •

SECURITY TIPS FOR MOBILE BANKING Tips to protect your information when using a mobile device to do your banking: • • •

Add to Reading List

Source URL: www.bhbt.com

Language: English - Date: 2014-11-10 13:37:48
2Open Mobile API for App Developers: Speeds Time to Market and Reduces Development Overhead while Ensuring Advanced Security for Sensitive Applications The emergence of smartphones and tablets

Open Mobile API for App Developers: Speeds Time to Market and Reduces Development Overhead while Ensuring Advanced Security for Sensitive Applications The emergence of smartphones and tablets

Add to Reading List

Source URL: simalliance.org

Language: English - Date: 2016-01-26 04:40:08
3Microsoft Word - SystemSpecCompliance.doc

Microsoft Word - SystemSpecCompliance.doc

Add to Reading List

Source URL: www.globalplatform.org

Language: English - Date: 2011-02-25 21:08:34
4Market-driven Code Provisioning to Mobile Secure Hardware Alexandra Dmitrienko2 , Stephan Heuser1 , Thien Duc Nguyen1 , Marcos da Silva Ramos2 , Andre Rein2 , and Ahmad-Reza Sadeghi1 1

Market-driven Code Provisioning to Mobile Secure Hardware Alexandra Dmitrienko2 , Stephan Heuser1 , Thien Duc Nguyen1 , Marcos da Silva Ramos2 , Andre Rein2 , and Ahmad-Reza Sadeghi1 1

Add to Reading List

Source URL: www.trust.informatik.tu-darmstadt.de

Language: English - Date: 2015-02-25 06:38:39
5Improving Premium Content Protection with the Trusted Execution Environment White Paper September 2015

Improving Premium Content Protection with the Trusted Execution Environment White Paper September 2015

Add to Reading List

Source URL: www.globalplatform.org

Language: English - Date: 2015-09-15 18:51:48
    6TM  Certification of the Trusted Execution Environment – one step ahead for secure mobile devices GlobalPlatform Member Representatives:

    TM Certification of the Trusted Execution Environment – one step ahead for secure mobile devices GlobalPlatform Member Representatives:

    Add to Reading List

    Source URL: www.commoncriteriaportal.org

    - Date: 2013-09-30 08:03:44
      7Trusted Disk Loading in the Emulab Network Testbed Cody Cutler University of Utah, School of Computing  www.emulab.net Abstract

      Trusted Disk Loading in the Emulab Network Testbed Cody Cutler University of Utah, School of Computing www.emulab.net Abstract

      Add to Reading List

      Source URL: people.csail.mit.edu

      Language: English - Date: 2012-08-12 13:04:25
      8Solution Brief Intel® vPro™ Technology Trusted Platform Management Department of Defense Creates a Secure, Virtualized Environment

      Solution Brief Intel® vPro™ Technology Trusted Platform Management Department of Defense Creates a Secure, Virtualized Environment

      Add to Reading List

      Source URL: www.gdc4s.com

      Language: English - Date: 2014-12-02 04:04:55
      9LNCS[removed]Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing

      LNCS[removed]Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing

      Add to Reading List

      Source URL: www.cisa.umbc.edu

      Language: English - Date: 2012-01-13 12:57:13
      10Trusted Isolation Environment: An Attestation Architecture with Usage Control Model Anbang Ruan1,2, Qingni Shen1,2, Liang Gu2,3, Li Wang1,2, Lei Shi2,3, Yahui Yang1,2, and Zhong Chen1,2,3 1

      Trusted Isolation Environment: An Attestation Architecture with Usage Control Model Anbang Ruan1,2, Qingni Shen1,2, Liang Gu2,3, Li Wang1,2, Lei Shi2,3, Yahui Yang1,2, and Zhong Chen1,2,3 1

      Add to Reading List

      Source URL: sei.pku.edu.cn

      Language: English - Date: 2010-11-11 21:05:05