Fingerprint
Dive into the research topics of 'Using Trusted Execution Environments in Two-factor Authentication: comparing approaches'. Together they form a unique fingerprint.- Sort by
- Weight
- Alphabetically
Roland M. van Rijswijk, Erik Poll
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review