Search

Your search keyword '"Mobile Trusted Computing"' showing total 3 results

Search Constraints

Start Over You searched for: Descriptor "Mobile Trusted Computing" Remove constraint Descriptor: "Mobile Trusted Computing"
3 results on '"Mobile Trusted Computing"'

Search Results

1. Anonymous RFID Authentication Using Trusted Computing Technologies

2. Implementation Aspects of Mobile and Embedded Trusted Computing

3. Trusted mobile computing: An overview of existing solutions

Catalog

Books, media, physical & digital resources