Search

Your search keyword '"Trusted service manager"' showing total 174 results

Search Constraints

Start Over You searched for: Descriptor "Trusted service manager" Remove constraint Descriptor: "Trusted service manager" Topic computer security Remove constraint Topic: computer security
174 results on '"Trusted service manager"'

Search Results

1. PSAP: Pseudonym-Based Secure Authentication Protocol for NFC Applications

2. Survey on key technology development and application in trusted computing

3. An Unlinkable Anonymous Payment Scheme based on near field communication

4. Untraceable and Anonymous Mobile Payment Scheme Based on Near Field Communication

5. A Trust Rating Model Using Fuzzy Logic in Cloud

6. Trusted mobile computing: An overview of existing solutions

7. Secure and Trusted Open CPS Platforms

8. A Development of Trusted Mobile Smart Message Wallet Service Broker (TmSMWSB) Architecture

9. A novel consumer-centric card management architecture and potential security issues

10. DroidPosture: A trusted posture assessment service for mobile devices

11. Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments

12. Secure Tera-Scale Data Crunching With A Small Tcb

13. Enhancing Trusted Cloud Computing Platform for Infrastructure as aService

14. Trusted Integrated Circuits: The Problem and Challenges

15. Mobile Trusted Computing

16. The Untapped Potential of Trusted Execution Environments on Mobile Devices

17. Label's Verification Technology of Gateway Based on Trusted Label

18. Study on Quality of Service Based on Trusted Computing

19. A trusted measurement scheme suitable for the clients in the trusted network

20. Study on the Trusted Operating Technology for Mobile E-Commerce System Secure

21. Secure solution of trusted Internet of things base on TCM

22. Study on the Design of Trusted Secure Cloud System Structure

24. Web Service System Structure based on Trusted Computing Platform

25. Study on Trusted Access Model Based on User Behavior

26. ◾ Cloud Security Access Control: Distributed Access Control

27. Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems

28. Using Trusted Platform Module (TPM) to Secure Business

29. Research and Design of Trusted Computing Platform

30. Secure Application Execution in Mobile Devices

31. Research on Trusted Bootstrap Based on the Universal Smart Card

32. The Implementation of Trusted Computing Based Network Trusted Management Information System

33. Trusted Dynamic Self-confidence Migration of Cloud Service

34. Study on Grade Division Policy for Trusted Network

35. A Role-Based Service Level NFC Ecosystem Model

37. Research of Trusted Network Security Technology

38. Novel access and remediation scheme in hierarchical trusted network

39. Dynamic Trusted Domain: Preventing Data Leakage of Trusted Subjects

40. Mobile Trusted Computing Based on MTM

41. Research on theory and key technology of trusted computing platform security testing and evaluation

42. Research on trusted computing and its development

43. Study of new trusted network framework

44. A Study on Secure Key Backup/Recovery Scheme for Device based on Mobile Trusted Module

45. Study on development of trusted computing

46. A snapshot of trusted personal devices applicable to transaction processing

47. Identity management and web services as service ecosystem drivers in converged networks

48. Trusted objects in trusted operating system

49. A mobile device management framework for secure service delivery

50. A secure model for mobile agent based on encrypted circuit construction

Catalog

Books, media, physical & digital resources