Split and Conquer: Don’t Put All Your Keys in One Basket

  • Tuesday, July 22, 2014 | 16.15 – 17.00 hrs | Sands Level 4 | Room: Peony 4505

View all Sessions

Challenges and recommended approach for building mobile security solutions, with a focus on splitting users key credential information (such as biometric data) on the mobile device, on wearable/carry-ables or on (cloud) servers. Paramount to this design is achieving a proper balance between usability and the security strength achieved.


This document was retrieved from on Wed, 26 Oct 2016 13:09:15 -0400.
© 2016 EMC Corporation. All rights reserved.