Login / Signup
Using Trusted Execution Environments in Two-factor Authentication: comparing approaches.
Roland van Rijswijk-Deij
Erik Poll
Published in:
Open Identity Summit (2013)
Keyphrases
</>
low cost
feature extraction