How Secure are Current Mobile Operating Systems?


There are numerous initiatives to use mobile devices as so-called “trusted pocket signers” to produce electronic signatures. The actual signature is generated by means of a conventional signature card. The mobile device serves as the card reader, storage device for the document to be signed and as a display for the signature application. The operating… (More)
DOI: 10.1007/0-387-24486-7_4


4 Figures and Tables

Slides referencing similar topics