Login / Signup

Using trusted computing for privacy preserving keystroke-based authentication in smartphones.

Mohammad NaumanTamleek AliAzhar Rauf
Published in: Telecommun. Syst. (2013)
Keyphrases