A security policy based upon hardware encryption
This paper presents an overview of a mobile communications device that implements a key management policy and hardware encryption for data-centric security. Examples of applications for this device include portable medical record systems, inventory tracking systems, communication devices, and portab...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Schreiben Sie den ersten Kommentar!