Split and Conquer: Don’t Put All Your Keys in One Basket

  • Tuesday, July 22, 2014 | 16:15 – 17:00 | Sands Level 4 | Room: Peony 4505

View all Sessions

Challenges and recommended approach for building mobile security solutions, with a focus on splitting users key credential information (such as biometric data) on the mobile device, on wearable/carry-ables or on (cloud) servers. Paramount to this design is achieving a proper balance between usability and the security strength achieved.


This document was retrieved from on Wed, 02 Dec 2015 00:10:09 -0500.
© 2015 EMC Corporation. All rights reserved.