On Wed, Jun 23, 2010, Shaz wrote:
We are designing some work based on our existing implementation of secure computing on mobile devices
Do you have pointers to your existing implementation outlining what it covers? Security is a rather large topic, I'm not sure where your efforts are targeted.
Thanks