Mobile platform security

4Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

End-user expectations regarding features in mobile phones have increased dramatically in recent years, not the least where security functionality is concerned. End users, operators, and content providers take it for granted that the mobile platform will protect all vital information in and about a mobile phone. And Ericsson is proud to say that thanks to robust security mechanisms and rich, basic-platform-security functionality, its new generation of mobile platforms fully lives up to these expectations. The authors describe the hardware and software security architecture and building blocks implemented in the new mobile platforms. In particular, they describe "core" security functionality such as secure boot, secure reprogramming, and the protection of critical parameters.

Cite

CITATION STYLE

APA

Gehrmann, C., & Ståhl, P. (2006). Mobile platform security. Ericsson Review (English Edition). https://doi.org/10.2200/s00555ed1v01y201312spt009

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free