Trusting Mobile User Devices and Security Modules

@article{Pfitzmann1997TrustingMU,
  title={Trusting Mobile User Devices and Security Modules},
  author={Andreas Pfitzmann and Birgit Pfitzmann and Matthias Schunter and Michael Waidner},
  journal={IEEE Computer},
  year={1997},
  volume={30},
  pages={61-68}
}
Highly Cited
This paper has 125 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 74 extracted citations

Ad Hoc Wireless Networking

Network Theory and Applications • 2004
View 4 Excerpts
Highly Influenced

Device Security

View 4 Excerpts
Highly Influenced

Security Services in an Open Service Environment

ACSAC • 1998
View 3 Excerpts
Highly Influenced

Defending surveillance sensor networks against data-injection attacks via trusted nodes

2017 25th European Signal Processing Conference (EUSIPCO) • 2017
View 1 Excerpt

Design and Evaluation of an Architecture for Ubiquitous User Authentication Based on Identity Management Systems

2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications • 2011
View 1 Excerpt

126 Citations

051015'97'02'08'14
Citations per Year
Semantic Scholar estimates that this publication has 126 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.

Similar Papers

Loading similar papers…