Managing secure use of a terminal

作者: Frédéric Rousseau

DOI:

关键词:

摘要: A terminal exhibits at least one functionality made secure on the basis of a security item. entity stores said item as well first authentication parameters. The second At level terminal, an is performed (11) and Next, contactless link established (12) with entity. Finally, stored received (23) in course link.

参考文章(9)
Francis L. Nguyen, Leigh Perona, Kin Doe, Method and apparatus for a secure computing environment ,(2001)
Charles N. Lynk, Orville M. Eness, Donald L. Linder, Portable telephone system having a battery saver feature ,(1974)
P. McDaniel, S. Jamin, Windowed certificate revocation international conference on computer communications. ,vol. 3, pp. 1406- 1414 ,(2000) , 10.1109/INFCOM.2000.832538
John E. Corrigan, Mohammad Soleimani, Satellite terminal with sleep mode ,(1995)