Search

Your search keyword '"Trusted service manager"' showing total 235 results

Search Constraints

Start Over You searched for: Descriptor "Trusted service manager" Remove constraint Descriptor: "Trusted service manager"
235 results on '"Trusted service manager"'

Search Results

2. Conclusions

5. PSAP: Pseudonym-Based Secure Authentication Protocol for NFC Applications

6. A Role-Based Service Level NFC Ecosystem Model.

7. Survey on key technology development and application in trusted computing

8. An Unlinkable Anonymous Payment Scheme based on near field communication

9. Untraceable and Anonymous Mobile Payment Scheme Based on Near Field Communication

10. A Trust Rating Model Using Fuzzy Logic in Cloud

11. Trusted mobile computing: An overview of existing solutions

12. Secure and Trusted Open CPS Platforms

13. A Development of Trusted Mobile Smart Message Wallet Service Broker (TmSMWSB) Architecture

14. A novel consumer-centric card management architecture and potential security issues

15. Collective action for mobile payment platforms: A case study on collaboration issues between banks and telecom operators

16. DroidPosture: A trusted posture assessment service for mobile devices

17. Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments

18. Secure Tera-Scale Data Crunching With A Small Tcb

19. Design of a Secure Location Based Service for Mobile Cloud Applications

20. Service Mining for Trusted Service Composition in Cross-Cloud Environment

21. Implementation of a secure USIM COS architecture for mobile payment applications

22. Enhancing Trusted Cloud Computing Platform for Infrastructure as aService

23. Succeeding with contactless service innovations - strategic recommendations based on a comparative analysis of mobile business ecosystems in Norway

24. Trusted Integrated Circuits: The Problem and Challenges

25. Mobile Trusted Computing

26. The Untapped Potential of Trusted Execution Environments on Mobile Devices

27. Label's Verification Technology of Gateway Based on Trusted Label

28. Study on Quality of Service Based on Trusted Computing

29. A trusted measurement scheme suitable for the clients in the trusted network

30. Study on the Trusted Operating Technology for Mobile E-Commerce System Secure

31. Secure solution of trusted Internet of things base on TCM

32. Protocol for trusted channel based on portable trusted module

33. Study on the Design of Trusted Secure Cloud System Structure

35. Web Service System Structure based on Trusted Computing Platform

36. Study on Trusted Access Model Based on User Behavior

37. ◾ Cloud Security Access Control: Distributed Access Control

38. Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems

39. Secure Identification of Actively Executed Code on a Generic Trusted Component

40. IoTEE-An integrated framework for rapid trusted IOT application development

41. Using Trusted Platform Module (TPM) to Secure Business

42. Research and Design of Trusted Computing Platform

43. Secure Application Execution in Mobile Devices

44. An Application-Oriented Efficient Encapsulation System for Trusted Software Development

45. seTPM: Towards Flexible Trusted Computing on Mobile Devices Based on GlobalPlatform Secure Elements

46. Research on Trusted Bootstrap Based on the Universal Smart Card

47. A Trusted Mobile Interaction in Ubiquitous Networks

48. The Implementation of Trusted Computing Based Network Trusted Management Information System

49. A Layered Trusted Computing Platform Module with Unified Deployment on Server

50. Trusted Dynamic Self-confidence Migration of Cloud Service

Catalog

Books, media, physical & digital resources