메뉴 건너뛰기




Volumn 4677 LNCS, Issue , 2007, Pages 282-323

Trusted mobile platforms

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE; INFORMATION TECHNOLOGY; MOBILE DEVICES; PERSONAL DIGITAL ASSISTANTS;

EID: 38049048092     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74810-6_10     Document Type: Conference Paper
Times cited : (20)

References (93)
  • 1
    • 38049048575 scopus 로고    scopus 로고
    • Specification Architecture Overview
    • Version 1.2, The Trusted Computing Group (TCG, Portland, Oregon, USA April
    • TCG: TCG Specification Architecture Overview. TCG Specification Version 1.2, The Trusted Computing Group (TCG), Portland, Oregon, USA (April 2003)
    • (2003) TCG Specification
    • TCG, T.C.G.1
  • 3
    • 85013596514 scopus 로고    scopus 로고
    • Concepts of trusted computing
    • Mitchell, C.J, ed, Trusted Computing, The Institute of Electrical Engineers IEE, London, UK, pp, April
    • Proudler, G.: Concepts of trusted computing. In: Mitchell, C.J. (ed.) Trusted Computing. IEE Professional Applications of Computing Series 6. The Institute of Electrical Engineers (IEE), London, UK, pp. 11-27 (April 2005)
    • (2005) IEE Professional Applications of Computing Series , vol.6 , pp. 11-27
    • Proudler, G.1
  • 5
    • 0004256091 scopus 로고    scopus 로고
    • 2nd edn. John Wiley and Sons Ltd, Chichester
    • Gollmann, D.: Computer Security, 2nd edn. John Wiley and Sons Ltd., Chichester (2005)
    • (2005) Computer Security
    • Gollmann, D.1
  • 6
    • 0004198635 scopus 로고    scopus 로고
    • 2nd edn. Prentice Hall PTR, Upper Saddle River, NJ
    • Pfleeger, C.P.: Security in Computing, 2nd edn. Prentice Hall PTR, Upper Saddle River, NJ (1997)
    • (1997) Security in Computing
    • Pfleeger, C.P.1
  • 7
    • 0012296562 scopus 로고
    • Department of Defense:, Department of Defense Trusted Computer System Evaluation Criteria
    • Department of Defense: DoD 5200.28-STD: Department of Defense Trusted Computer System Evaluation Criteria (1985)
    • (1985) DoD 5200.28-STD
  • 10
    • 17644388294 scopus 로고    scopus 로고
    • Trusted computing platforms, the next security solution
    • Technical Report HPL-2002-221, Hewlett-Packard Laboratories November, Available at
    • Pearson, S.: Trusted computing platforms, the next security solution. Technical Report HPL-2002-221, Hewlett-Packard Laboratories (November 2002), Available at http://www.hpl.hp.com/techreports/
    • (2002)
    • Pearson, S.1
  • 11
    • 35048896564 scopus 로고    scopus 로고
    • Varadharajan, V.: Trustworthy computing. In: Zhou, X., Su, S., Papazoglou, M.M.P., Orlowska, M.E., Jeffery, K.G. (eds.) WISE 2004. LNCS, 3306, pp. 13-16. Springer, Heidelberg (2004)
    • Varadharajan, V.: Trustworthy computing. In: Zhou, X., Su, S., Papazoglou, M.M.P., Orlowska, M.E., Jeffery, K.G. (eds.) WISE 2004. LNCS, vol. 3306, pp. 13-16. Springer, Heidelberg (2004)
  • 12
    • 3042699012 scopus 로고    scopus 로고
    • Understanding trusted computing: Will its benefits outweigh its drawbacks?
    • Feiten, E.W.: Understanding trusted computing: Will its benefits outweigh its drawbacks? IEEE Security & Privacy 1(3), 60-62 (2003)
    • (2003) IEEE Security & Privacy , vol.1 , Issue.3 , pp. 60-62
    • Feiten, E.W.1
  • 15
    • 38049073621 scopus 로고    scopus 로고
    • TCG: TPM Main, Part 1: Design Principles. TCG Specification Version 1.2 Revision 94, The Trusted Computing Group (TCG), Portland, Oregon, USA (March 2006)
    • TCG: TPM Main, Part 1: Design Principles. TCG Specification Version 1.2 Revision 94, The Trusted Computing Group (TCG), Portland, Oregon, USA (March 2006)
  • 16
    • 38049019671 scopus 로고    scopus 로고
    • TCG: TPM Main, Part 2: TPM Data Structures. TCG Specification Version 1.2 Revision 94, The Trusted Computing Group (TCG), Portland, Oregon, USA (March 2006)
    • TCG: TPM Main, Part 2: TPM Data Structures. TCG Specification Version 1.2 Revision 94, The Trusted Computing Group (TCG), Portland, Oregon, USA (March 2006)
  • 17
    • 38049042186 scopus 로고    scopus 로고
    • TCG: TPM Main, Part 3: Commands. TCG Specification Version 1.2 Revision 94, The Trusted Computing Group (TCG), Portland, Oregon, USA (March 2006)
    • TCG: TPM Main, Part 3: Commands. TCG Specification Version 1.2 Revision 94, The Trusted Computing Group (TCG), Portland, Oregon, USA (March 2006)
  • 18
    • 38049023390 scopus 로고    scopus 로고
    • TCG: TCG Software Stack (TSS) Specification. TCG Specification Version 1.2 Level 1, The Trusted Computing Group (TCG), Portland, Oregon, USA (January 2006)
    • TCG: TCG Software Stack (TSS) Specification. TCG Specification Version 1.2 Level 1, The Trusted Computing Group (TCG), Portland, Oregon, USA (January 2006)
  • 19
    • 33745803485 scopus 로고    scopus 로고
    • High assurance computing on open hardware architectures
    • MSRTR-2003-20, Microsoft Corporation March
    • Chen, Y., England, P., Peinado, M., Willman, B.: High assurance computing on open hardware architectures. Microsoft Technical Report MSRTR-2003-20, Microsoft Corporation (March 2003)
    • (2003) Microsoft Technical Report
    • Chen, Y.1    England, P.2    Peinado, M.3    Willman, B.4
  • 21
    • 33646445517 scopus 로고    scopus 로고
    • Peinado, M., Chen, Y., England, P., Manferdelli, J.: NGSCB: A trusted open system. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, 3108, pp. 86-97. Springer, Heidelberg (2004)
    • Peinado, M., Chen, Y., England, P., Manferdelli, J.: NGSCB: A trusted open system. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 86-97. Springer, Heidelberg (2004)
  • 22
    • 85013587012 scopus 로고    scopus 로고
    • An overview of NGSCB
    • Mitchell, C.J, ed, Trusted Computing, The Institute of Electrical Engineers IEE, London, UK, pp, April
    • Peinado, M., England, P., Chen, Y.: An overview of NGSCB. In: Mitchell, C.J. (ed.) Trusted Computing. IEE Professional Applications of Computing Series 6. The Institute of Electrical Engineers (IEE), London, UK, pp. 115-141 (April, 2005)
    • (2005) IEE Professional Applications of Computing Series , vol.6 , pp. 115-141
    • Peinado, M.1    England, P.2    Chen, Y.3
  • 24
    • 0013347999 scopus 로고    scopus 로고
    • The PERSEUS system architecture
    • 3335, 93381, IBM Research Division, Zurich Laboratory April
    • Pfitzmann, B., Riordan, J., Stuble, C., Waidner, M., Weber, A.: The PERSEUS system architecture. Technical Report RZ 3335 (#93381), IBM Research Division, Zurich Laboratory (April 2001)
    • (2001) Technical Report RZ
    • Pfitzmann, B.1    Riordan, J.2    Stuble, C.3    Waidner, M.4    Weber, A.5
  • 25
    • 35048881059 scopus 로고    scopus 로고
    • Taming Trusted Platforms by operating system design
    • Chae, K, Yung, M, eds, Information Security Applications, Springer, Heidelberg
    • Sadeghi, A., Stuble, C.: Taming Trusted Platforms by operating system design. In: Chae, K., Yung, M. (eds.) Information Security Applications. LNCS, vol. 2908, Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2908
    • Sadeghi, A.1    Stuble, C.2
  • 29
    • 24944584954 scopus 로고    scopus 로고
    • Intel: LaGrande technology architectural overview
    • Technical Report 252491-001, Intel Corporation September
    • Intel: LaGrande technology architectural overview. Technical Report 252491-001, Intel Corporation (September 2003)
    • (2003)
  • 33
    • 84955566566 scopus 로고    scopus 로고
    • A privacy-enhanced peer-to-peer reputation system
    • Bauknecht, K, Min Tjoa, A, Quirchmayr, G, eds, E-Commerce and Web Technologies, Springer, Heidelberg
    • Kinateder, M., Pearson, S.: A privacy-enhanced peer-to-peer reputation system. In: Bauknecht, K., Min Tjoa, A., Quirchmayr, G. (eds.) E-Commerce and Web Technologies. LNCS, vol. 2738, pp. 206-216. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2738 , pp. 206-216
    • Kinateder, M.1    Pearson, S.2
  • 34
    • 85013594843 scopus 로고    scopus 로고
    • Securing peer-to-peer networks using trusted computing
    • Mitchell, C.J, ed, The Institute of Electrical Engineers IEE, London, UK, pp
    • Balfe, S., Lakhani, A.D., Paterson, K.G.: Securing peer-to-peer networks using trusted computing. In: Mitchell, C.J. (ed.) Trusted Computing. The Institute of Electrical Engineers (IEE), London, UK, pp. 271-298 (2005)
    • (2005) Trusted Computing , pp. 271-298
    • Balfe, S.1    Lakhani, A.D.2    Paterson, K.G.3
  • 35
    • 85013580835 scopus 로고    scopus 로고
    • Secure delivery of conditional access applications to mobile receivers
    • Mitchell, C.J, ed, Trusted Computing, The Institute of Electrical Engineers IEE, London, UK, pp
    • Gallery, E., Tomlinson, A.: Secure delivery of conditional access applications to mobile receivers. In: Mitchell, C.J. (ed.) Trusted Computing. IEE Professional Applications of Computing Series 6. The Institute of Electrical Engineers (IEE), London, UK, pp. 195-238 (2005)
    • (2005) IEE Professional Applications of Computing Series , vol.6 , pp. 195-238
    • Gallery, E.1    Tomlinson, A.2
  • 36
    • 35048827792 scopus 로고    scopus 로고
    • Pashalidis, A., Mitchell, C.J.: Single sign-on using trusted platforms. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, 2851, pp. 54-68. Springer, Heidelberg (2003)
    • Pashalidis, A., Mitchell, C.J.: Single sign-on using trusted platforms. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 54-68. Springer, Heidelberg (2003)
  • 38
    • 84942776290 scopus 로고    scopus 로고
    • Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. In: DEXA
    • Los Alamitos
    • Mont, M.C., Pearson, S., Bramhall, P.: Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. In: DEXA 2003, pp. 377-382. IEEE Computer Society, Los Alamitos (2003)
    • (2003) 377-382. IEEE Computer Society , pp. 2003
    • Mont, M.C.1    Pearson, S.2    Bramhall, P.3
  • 39
    • 0142250282 scopus 로고    scopus 로고
    • Towards accountable management of privacy and identity information
    • Snekkenes, E, Gollmann, D, eds, ESORICS 2003, Springer, Heidelberg
    • Mont, M.C., Pearson, S., Bramhall, P.: Towards accountable management of privacy and identity information. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 146-161. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2808 , pp. 146-161
    • Mont, M.C.1    Pearson, S.2    Bramhall, P.3
  • 42
    • 2442419307 scopus 로고    scopus 로고
    • Trusted agents that enhance user privacy by self-profiling
    • Technical Report HPL-2002-196, HP Labs, Bristol, UK July 15
    • Pearson, S.: Trusted agents that enhance user privacy by self-profiling. Technical Report HPL-2002-196, HP Labs, Bristol, UK (July 15, 2002)
    • (2002)
    • Pearson, S.1
  • 43
    • 35248895553 scopus 로고    scopus 로고
    • Privacy preserving trust agents
    • Technical Report HPL-2004-197, HP Labs, Bristol, UK November 11
    • Crane, S.: Privacy preserving trust agents. Technical Report HPL-2004-197, HP Labs, Bristol, UK (November 11, 2004)
    • (2004)
    • Crane, S.1
  • 45
    • 24944497930 scopus 로고    scopus 로고
    • A method for trust sustainability among trusted computing platforms
    • Katsikas, S.K, Lopez, J, Pernul, G, eds, TrustBus 2004, Springer, Heidelberg
    • Yan, Z., Cofta, Z.: A method for trust sustainability among trusted computing platforms. In: Katsikas, S.K., Lopez, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, pp. 11-19. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3184 , pp. 11-19
    • Yan, Z.1    Cofta, Z.2
  • 46
    • 1142305232 scopus 로고    scopus 로고
    • Cryptography and competition policy -Issues with trusted computing
    • Boston, Massachsetts, USA, July 13-16, ACM, New York
    • Anderson, R.: Cryptography and competition policy -Issues with trusted computing. In: Proceedings of PODC '03, Boston, Massachsetts, USA, July 13-16, 2003, pp. 3-10. ACM, New York (2003)
    • (2003) Proceedings of PODC '03 , pp. 3-10
    • Anderson, R.1
  • 50
    • 85008038596 scopus 로고    scopus 로고
    • Improving the TCPA specification
    • Arbaugh, B.: Improving the TCPA specification. IEEE Computer 35(8), 77-79 (2002)
    • (2002) IEEE Computer , vol.35 , Issue.8 , pp. 77-79
    • Arbaugh, B.1
  • 51
    • 0038650651 scopus 로고
    • Dyad: A system for using physically secure coprocessors
    • Technical Report CMU-CS-91-140R, Carnigie Mellon University, Pittsburgh, Pennsylvania, USA May
    • Tygar, J., Yee, B.: Dyad: A system for using physically secure coprocessors. Technical Report CMU-CS-91-140R, Carnigie Mellon University, Pittsburgh, Pennsylvania, USA (May 1991)
    • (1991)
    • Tygar, J.1    Yee, B.2
  • 52
    • 0028533131 scopus 로고
    • BITS: A smartcard protected operating system
    • Clark, P., Hoffman, L.: BITS: a smartcard protected operating system. Communications of the ACM 37, 66-94 (1994)
    • (1994) Communications of the ACM , vol.37 , pp. 66-94
    • Clark, P.1    Hoffman, L.2
  • 53
    • 0030672130 scopus 로고    scopus 로고
    • A secure and reliable bootstrap architecture
    • Oakland, California, USA, pp, IEEE Computer Society Press, Los Alamitos, California
    • Arbaugh, W., Farber, D., Smith, J.: A secure and reliable bootstrap architecture. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy (S&P 1997), Oakland, California, USA, pp. 65-71. IEEE Computer Society Press, Los Alamitos, California (1997)
    • (1997) Proceedings of the 1997 IEEE Symposium on Security and Privacy (S&P , pp. 65-71
    • Arbaugh, W.1    Farber, D.2    Smith, J.3
  • 54
    • 84958776015 scopus 로고    scopus 로고
    • Itoi, N., Arbaugh, W., Pollack, S., Reeves, D.: Personal secure booting. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, 2119, pp. 130-141. Springer, Heidelberg (2001)
    • Itoi, N., Arbaugh, W., Pollack, S., Reeves, D.: Personal secure booting. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 130-141. Springer, Heidelberg (2001)
  • 55
    • 27544437127 scopus 로고    scopus 로고
    • PhD thesis, Department of Electrical Engineering, Stanford University, Stanford, California, USA December
    • Lie, D.: Architectural Support for Copy and Tamper Resistant Software. PhD thesis, Department of Electrical Engineering, Stanford University, Stanford, California, USA (December 2003)
    • (2003) Architectural Support for Copy and Tamper Resistant Software
    • Lie, D.1
  • 58
    • 33845929758 scopus 로고    scopus 로고
    • Masters thesis, Department of Computer Science, The University of Auckland, New Zealand February
    • Barrett, M.F.: Towards an open trusted computing framework. Masters thesis, Department of Computer Science, The University of Auckland, New Zealand (February 2005)
    • (2005) Towards an open trusted computing framework
    • Barrett, M.F.1
  • 59
    • 38049096024 scopus 로고    scopus 로고
    • TCG: TCG PC client specific implementation specification for conventional BIOS. TCG specification Version 1.2 Final, The Trusted Computing Group (TCG), Portland, Oregon, USA (July 2005)
    • TCG: TCG PC client specific implementation specification for conventional BIOS. TCG specification Version 1.2 Final, The Trusted Computing Group (TCG), Portland, Oregon, USA (July 2005)
  • 61
    • 38049038244 scopus 로고    scopus 로고
    • TCG: TCG EFI platform -for TPM family 1.1 or 1.2. TCG specification Version 1.2 Final, The Trusted Computing Group (TCG), Portland, Oregon, USA (June 2006)
    • TCG: TCG EFI platform -for TPM family 1.1 or 1.2. TCG specification Version 1.2 Final, The Trusted Computing Group (TCG), Portland, Oregon, USA (June 2006)
  • 62
    • 38049024378 scopus 로고    scopus 로고
    • TCG: TCG Credential Profiles. TCG Specification Version 1.1 Revision 1.014 For TPM Family 1,2; Level 2, The Trusted Computing Group (TCG), Portland, Oregon, USA (May 2007)
    • TCG: TCG Credential Profiles. TCG Specification Version 1.1 Revision 1.014 For TPM Family 1,2; Level 2, The Trusted Computing Group (TCG), Portland, Oregon, USA (May 2007)
  • 63
    • 26444450117 scopus 로고    scopus 로고
    • Direct anonymous attestation
    • Technical Report HPL-2004-93, Hewlett-Packard Laboratories June, Available at
    • Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. Technical Report HPL-2004-93, Hewlett-Packard Laboratories (June 2004), Available at http ://www.hpl.hp. com/techreports/
    • (2004)
    • Brickell, E.1    Camenisch, J.2    Chen, L.3
  • 64
    • 14844295011 scopus 로고    scopus 로고
    • Direct anonymous attestation
    • Pfitzmann, B, Liu, P, eds, ACM Press, New York
    • Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Pfitzmann, B., Liu, P. (eds.) Proceedings of CCS '04, ACM Press, pp. 132-145. ACM Press, New York (2004)
    • (2004) Proceedings of CCS '04, ACM Press , pp. 132-145
    • Brickell, E.1    Camenisch, J.2    Chen, L.3
  • 65
    • 85013604515 scopus 로고    scopus 로고
    • The DAA scheme in context
    • Mitchell, C.J, ed, Trusted Computing, The Institute of Electrical Engineers IEE, London, UK, pp
    • Brickell, E., Camenisch, J., Chen, L.: The DAA scheme in context. In: Mitchell, C.J. (ed.) Trusted Computing. IEE Professional Applications of Computing Series 6. The Institute of Electrical Engineers (IEE), London, UK, pp. 143-174 (2005)
    • (2005) IEE Professional Applications of Computing Series , vol.6 , pp. 143-174
    • Brickell, E.1    Camenisch, J.2    Chen, L.3
  • 66
    • 38049066710 scopus 로고    scopus 로고
    • Use Case Scenarios
    • Version 2.7, The Trusted Computing Group, Mobile Phone Working Group, Portland, Oregon, USA September
    • TCG MPWG: Use Case Scenarios. TCG Specification Version 2.7, The Trusted Computing Group, Mobile Phone Working Group, Portland, Oregon, USA (September 2005)
    • (2005) TCG Specification
    • MPWG, T.1
  • 67
    • 38049010840 scopus 로고    scopus 로고
    • TCG MPWG: The TCG mobile trusted module specification. TCG specification version 0.9 revision 1, The Trusted Computing Group (TCG), Portland, Oregon, USA (September 2006)
    • TCG MPWG: The TCG mobile trusted module specification. TCG specification version 0.9 revision 1, The Trusted Computing Group (TCG), Portland, Oregon, USA (September 2006)
  • 68
    • 38049078298 scopus 로고    scopus 로고
    • Mobile trusted module specification overview document
    • The Trusted Computing Group TCG, Beaverton, Oregon, USA
    • TCG MPWG: Mobile trusted module specification overview document. Mobile trusted module specification support documents, The Trusted Computing Group (TCG), Beaverton, Oregon, USA (2006)
    • (2006) Mobile trusted module specification support documents
    • MPWG, T.1
  • 69
    • 38049038742 scopus 로고    scopus 로고
    • Authorisation issues for mobile code in mobile systems
    • Technical Report RHUL-MA-2007-3, Department of Mathematics, Royal Holloway, University of London
    • Gallery, E.: Authorisation issues for mobile code in mobile systems. Technical Report RHUL-MA-2007-3, Department of Mathematics, Royal Holloway, University of London (2007)
    • (2007)
    • Gallery, E.1
  • 70
    • 38049055660 scopus 로고    scopus 로고
    • OMA: DRM architecture v2.0. Technical Specification OMA-DRM-ARCH- V2D2004071515-C, The Open Mobile Alliance (OMA) (July 2004)
    • OMA: DRM architecture v2.0. Technical Specification OMA-DRM-ARCH- V2D2004071515-C, The Open Mobile Alliance (OMA) (July 2004)
  • 73
    • 38049001845 scopus 로고    scopus 로고
    • OMA: OMA DRM V2.0 approved enabler specification. Technical Specification OMA-ERP-DRM-V2.0-20060303-A, The Open Mobile Alliance (OMA) (July 2004)
    • OMA: OMA DRM V2.0 approved enabler specification. Technical Specification OMA-ERP-DRM-V2.0-20060303-A, The Open Mobile Alliance (OMA) (July 2004)
  • 74
    • 38049086925 scopus 로고    scopus 로고
    • OMA: Digital Rights Management v1.0. Technical Specification OMA-DownloadDRM-V1_0-20040615-A, The Open Mobile Alliance (OMA) (June 2004)
    • OMA: Digital Rights Management v1.0. Technical Specification OMA-DownloadDRM-V1_0-20040615-A, The Open Mobile Alliance (OMA) (June 2004)
  • 75
    • 38049048574 scopus 로고    scopus 로고
    • OMA: DRM architecture specification v1.0. Technical Specification OMADownload-ARCH-V1_0-20040625-A, The Open Mobile Alliance (OMA) (June 2004)
    • OMA: DRM architecture specification v1.0. Technical Specification OMADownload-ARCH-V1_0-20040625-A, The Open Mobile Alliance (OMA) (June 2004)
  • 76
    • 38049009286 scopus 로고    scopus 로고
    • OMA: DRM specification v2.0. Technical Specification OMA-DRM-DRM- V2_020040716-C, The Open Mobile Alliance (OMA) (July 2004)
    • OMA: DRM specification v2.0. Technical Specification OMA-DRM-DRM- V2_020040716-C, The Open Mobile Alliance (OMA) (July 2004)
  • 77
    • 38049051682 scopus 로고    scopus 로고
    • CMLA: Client adopter agreement. Technical Report Revision 1.00-050708, The Content Management License Administrator Limited Liability Company (CMLA, LLC) (August 2005)
    • CMLA: Client adopter agreement. Technical Report Revision 1.00-050708, The Content Management License Administrator Limited Liability Company (CMLA, LLC) (August 2005)
  • 79
    • 38049018387 scopus 로고
    • The GSM System for Mobile Communications. Cell & Sys
    • Palaiseau, France
    • Mouley, M., Pautet, M.: The GSM System for Mobile Communications. Cell & Sys. Correspondence, Palaiseau, France (1992)
    • (1992) Correspondence
    • Mouley, M.1    Pautet, M.2
  • 80
    • 38049036202 scopus 로고    scopus 로고
    • 3GPP GSM TSGS: Personalisation of mobile equipment (ME, Mobile functionality specification (release 5, Technical specification TS 22.022 v5.0.0, 3rd Generation Partnership Project (3GPP, Global System for Mobile Communications (GSM, Technical Specification Group Services and System Aspects, Sophia Antipolis, France 2002
    • 3GPP GSM TSGS: Personalisation of mobile equipment (ME), Mobile functionality specification (release 5). Technical specification TS 22.022 v5.0.0, 3rd Generation Partnership Project (3GPP), Global System for Mobile Communications (GSM) -Technical Specification Group Services and System Aspects, Sophia Antipolis, France (2002)
  • 82
    • 38049016271 scopus 로고    scopus 로고
    • OMA: Device management requirements candidate version 1.2. Technical Specification OMA-RD-DM-V1_2-20060424-C., The Open Mobile Alliance (OMA) (April 2006)
    • OMA: Device management requirements candidate version 1.2. Technical Specification OMA-RD-DM-V1_2-20060424-C., The Open Mobile Alliance (OMA) (April 2006)
  • 83
    • 38049021929 scopus 로고    scopus 로고
    • Overview and definition of software download for rf reconfiguration. SDRF Archived Approved Document DL-DFN Document SDRF-02-A-0002-V.O.O
    • SDRF
    • SDRF: Overview and definition of software download for rf reconfiguration. SDRF Archived Approved Document DL-DFN Document SDRF-02-A-0002-V.O.O, The Software Defined Radio Forum (SDRF) (August 2002)
    • (2002) The Software Defined Radio Forum (SDRF) (August
  • 84
  • 85
    • 38049078297 scopus 로고    scopus 로고
    • European Committee for Electrotechnical Standardization (CENELEC, Belgium: Common Interface Specification for Conditional Access and other Digital Video Broadcasting Decoder Applications February
    • European Committee for Electrotechnical Standardization (CENELEC) Brussels, Belgium: Common Interface Specification for Conditional Access and other Digital Video Broadcasting Decoder Applications (February 1997)
    • (1997) Brussels
  • 88
    • 38049077797 scopus 로고    scopus 로고
    • Wireless transport layer security version 06. Technical Specification WAP2610WTLS-20010406-a
    • WAPF
    • WAPF: Wireless transport layer security version 06. Technical Specification WAP2610WTLS-20010406-a, The Wireless Application Protocol Forum (WAPF) (April 2001)
    • (2001) The Wireless Application Protocol Forum (WAPF) (April
  • 91
    • 38049087423 scopus 로고    scopus 로고
    • Security considerations for operational software defined radio devices in a commercial wireless domain. SDRF working document
    • SDRF
    • SDRF: Security considerations for operational software defined radio devices in a commercial wireless domain. SDRF working document, The Software Defined Radio Forum (SDRF) (October 2004)
    • (2004) The Software Defined Radio Forum (SDRF) (October
  • 93
    • 38049040709 scopus 로고    scopus 로고
    • TCG: Subject key attestation evidence extension. TCG specification version 1.0 revision 7, The Trusted Computing Group (TCG), Portland, Oregon, USA (June 2005)
    • TCG: Subject key attestation evidence extension. TCG specification version 1.0 revision 7, The Trusted Computing Group (TCG), Portland, Oregon, USA (June 2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.