Device Onboarding Using FDO and the Untrusted Installer Model
Abstract
References
Index Terms
- Device Onboarding Using FDO and the Untrusted Installer Model
Recommendations
Privacy Preservation over Untrusted Mobile Networks
Privacy in Location-Based ApplicationsThe proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile network operators. These operators are typically assumed to be trusted and to ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 486Total Downloads
- Downloads (Last 12 months)486
- Downloads (Last 6 weeks)58
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderDigital Edition
View this article in digital edition.
Digital EditionHTML Format
View this article in HTML Format.
HTML FormatGet Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in