Author:
Nyman Thomas,Ekberg Jan-Erik,Asokan N.
Funder
Academy of Finland
Intel Collaborative Research Institute for Secure Computing
Reference18 articles.
1. A New Model: The Consumer-Centric Model and How It Applies to the Mobile Ecosystem. Tech. rep., GlobalPlatform, Mar. 2012.
2. Andrade, N., Monteleone, S., and Martin, A. Electronic Identity in Europe: Legal challenges and future perspectives. JRC-IPTS Working Papers JRC78200, Institute for Prospective and Technological Studies, Joint Research Centre, Dec. 2013.
3. Chen, L., and Li, J. Flexible and Scalable Digital Signatures in TPM 2.0. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (New York, NY, USA, 2013), CCS '13, ACM, pp. 37--48. 16http://openid.net/
4. Dmitrienko, A., Sadeghi, A.-R., Tamrakar, S., and Wachsmann, C. SmartTokens: Delegable Access Control with NFC-Enabled Smartphones. In Proceedings of the 5th International Conference on Trust and Trustworthy Computing (Berlin, Heidelberg, 2012), TRUST'12, Springer-Verlag, pp. 219--238.
5. Ekberg, J.-E., Kostiainen, K., and Asokan, N. The Untapped Potential of Trusted Execution Environments on Mobile Devices. Security Privacy, IEEE 12, 4 (July 2014), 29--37.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secure Role and Rights Management for Automotive Access and Feature Activation;Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security;2021-05-24
2. Trust Anchors in Software Defined Networks;Computer Security;2018
3. Real-World Identification for an Extensible and Privacy-Preserving Mobile eID;IFIP Advances in Information and Communication Technology;2018
4. Architectures for Enhancing Authentication Privacy and Security using Trusted Computing;Proceedings of the 2nd Workshop on System Software for Trusted Execution;2017-10-28
5. Real-World Identification;Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media;2016-11-28