Login / Signup
The use of hardware tokens for identity management.
Geoff Brown
Published in:
Inf. Secur. Tech. Rep. (2004)
Keyphrases
</>
identity management
access control
personal information
cloud computing
user centric
low cost
hardware and software
real time
high level
multimedia
hardware implementation
embedded systems
context sensitive
line segments
computer systems
case study
user privacy