Vetting and Improving the Usage of Trusted Execution Environments for Authentication in Mobile Devices
pdf
Submitted by Antonio Bianchi
on
pdf
Submitted by Antonio Bianchi
on