Login / Signup
Countering Phishing with TPM-bound Credentials.
Ingo Bente
Jörg Vieweg
Josef von Helden
Published in:
ISSE (2010)
Keyphrases
</>
lower bound
upper bound
email
worst case
access control
countermeasures
identity theft
spam filtering
feature selection
vc dimension
trusted computing