Using Trusted Execution Environments in Two-factor Authentication: comparing approaches

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    69 Downloads (Pure)

    Fingerprint

    Dive into the research topics of 'Using Trusted Execution Environments in Two-factor Authentication: comparing approaches'. Together they form a unique fingerprint.