By Topic

Toward Flexible Security and Trust Hardware Structures for Mobile-Portable Systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Fournaris, A.P. ; Univ. of Patras, Patras, Greece

Mobile and portable computing devices are claiming an increasingly big part of recent and future IT user applications. However, in security demanding environments like financial, government or crisis management systems, the mobile, portable world is unable to provide a strong security infrastructure capable of supporting a high level of trust to related mobile applications. In this paper, we discuss the existing hardware attempts toward providing strong security and trust mechanisms for mobile-portable systems. We focus our analysis on the Trusted Computing Group initiative for mobile trust and highlight the design and implementation problems of such endeavor. We propose using hardware efficient cryptographic algorithms for the Hardware mobile trust environments capable of supporting flexible security protocols and suggest Elliptic Curve cryptography and associated Pairing Based protocols as the best approach toward this end.

Published in:

Latin America Transactions, IEEE (Revista IEEE America Latina)  (Volume:10 ,  Issue: 3 )