Biometric Enabled Portable Trusted Computing Platform

Abstract

Existing proposals to address trusted end-to-end communication tend to focus on attestation between client applications and their enterprise servers. These proposals have given little or no consideration to the vulnerabilities between client applications and their users, resulting in identity thefts or impersonator. To address this problem, we propose a… (More)
DOI: 10.1109/TrustCom.2011.56

4 Figures and Tables

Topics

  • Presentations referencing similar topics