Search

Your search keyword '"Trusted service manager"' showing total 192 results

Search Constraints

Start Over You searched for: Descriptor "Trusted service manager" Remove constraint Descriptor: "Trusted service manager" Topic computer Remove constraint Topic: computer
192 results on '"Trusted service manager"'

Search Results

1. PSAP: Pseudonym-Based Secure Authentication Protocol for NFC Applications

2. Survey on key technology development and application in trusted computing

3. An Unlinkable Anonymous Payment Scheme based on near field communication

4. Untraceable and Anonymous Mobile Payment Scheme Based on Near Field Communication

5. A Trust Rating Model Using Fuzzy Logic in Cloud

6. Trusted mobile computing: An overview of existing solutions

7. Secure and Trusted Open CPS Platforms

8. A Development of Trusted Mobile Smart Message Wallet Service Broker (TmSMWSB) Architecture

9. A novel consumer-centric card management architecture and potential security issues

10. DroidPosture: A trusted posture assessment service for mobile devices

11. Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments

12. Secure Tera-Scale Data Crunching With A Small Tcb

13. Implementation of a secure USIM COS architecture for mobile payment applications

14. Enhancing Trusted Cloud Computing Platform for Infrastructure as aService

15. Trusted Integrated Circuits: The Problem and Challenges

16. Mobile Trusted Computing

17. The Untapped Potential of Trusted Execution Environments on Mobile Devices

18. Label's Verification Technology of Gateway Based on Trusted Label

19. Study on Quality of Service Based on Trusted Computing

20. A trusted measurement scheme suitable for the clients in the trusted network

21. Study on the Trusted Operating Technology for Mobile E-Commerce System Secure

22. Secure solution of trusted Internet of things base on TCM

23. Study on the Design of Trusted Secure Cloud System Structure

25. Web Service System Structure based on Trusted Computing Platform

26. Study on Trusted Access Model Based on User Behavior

27. ◾ Cloud Security Access Control: Distributed Access Control

28. Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems

29. Secure Identification of Actively Executed Code on a Generic Trusted Component

30. Using Trusted Platform Module (TPM) to Secure Business

31. Research and Design of Trusted Computing Platform

32. Secure Application Execution in Mobile Devices

33. seTPM: Towards Flexible Trusted Computing on Mobile Devices Based on GlobalPlatform Secure Elements

34. Research on Trusted Bootstrap Based on the Universal Smart Card

35. The Implementation of Trusted Computing Based Network Trusted Management Information System

36. Trusted Dynamic Self-confidence Migration of Cloud Service

37. Study on Grade Division Policy for Trusted Network

38. A Role-Based Service Level NFC Ecosystem Model

39. Trusted Mobile Nodes Access Scheme under Wireless Networks

41. Research of Trusted Network Security Technology

42. Novel access and remediation scheme in hierarchical trusted network

43. Dynamic Trusted Domain: Preventing Data Leakage of Trusted Subjects

44. Mobile Trusted Computing Based on MTM

45. Research on theory and key technology of trusted computing platform security testing and evaluation

46. Research on trusted computing and its development

47. Study of new trusted network framework

48. A Study on Secure Key Backup/Recovery Scheme for Device based on Mobile Trusted Module

49. Study on development of trusted computing

50. A snapshot of trusted personal devices applicable to transaction processing

Catalog

Books, media, physical & digital resources