Login / Signup

Countering Phishing with TPM-bound Credentials.

Ingo BenteJörg ViewegJosef von Helden
Published in: ISSE (2010)
Keyphrases
  • lower bound
  • upper bound
  • email
  • worst case
  • access control
  • countermeasures
  • identity theft
  • spam filtering
  • feature selection
  • vc dimension
  • trusted computing