How Secure are Current Mobile Operating Systems?

Abstract

There are numerous initiatives to use mobile devices as so-called “trusted pocket signers” to produce electronic signatures. The actual signature is generated by means of a conventional signature card. The mobile device serves as the card reader, storage device for the document to be signed and as a display for the signature application. The operating… (More)
DOI: 10.1007/0-387-24486-7_4

Topics

4 Figures and Tables

Slides referencing similar topics