Split and Conquer: Don’t Put All Your Keys in One Basket

  • Tuesday, July 22, 2014 | 16:15 – 17:00 | Sands Level 4 | Room: Peony 4505

View all Sessions

Challenges and recommended approach for building mobile security solutions, with a focus on splitting users key credential information (such as biometric data) on the mobile device, on wearable/carry-ables or on (cloud) servers. Paramount to this design is achieving a proper balance between usability and the security strength achieved.


This document was retrieved from on Sun, 04 Oct 2015 03:30:01 -0400.
© 2015 EMC Corporation. All rights reserved.