Split and Conquer: Don’t Put All Your Keys in One Basket

  • Tuesday, July 22, 2014 | 16:15 – 17:00 | Sands Level 4 | Room: Peony 4505

View all Sessions

Challenges and recommended approach for building mobile security solutions, with a focus on splitting users key credential information (such as biometric data) on the mobile device, on wearable/carry-ables or on (cloud) servers. Paramount to this design is achieving a proper balance between usability and the security strength achieved.


This document was retrieved from on Wed, 10 Feb 2016 17:04:51 -0500.
© 2016 EMC Corporation. All rights reserved.