C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Using Trusted Execution Environments in Two-factor Authentication: comparing approaches.
Roland van Rijswijk-Deij
Erik Poll
Published in:
Open Identity Summit (2013)
Keyphrases
</>
low cost
feature extraction