International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 257

Review Papers | Computer Science & Engineering | India | Volume 6 Issue 3, March 2017 | Popularity: 6.1 / 10


     

Device Fingerprinting for Secure User Enrollment using TEE

Prathamesh Raut, Bhushan Patil


Abstract: Mobile phone users access content from web-sites using their browsers and nowadays as the power of mobile devices gone to high level compared to old handsets, every service provider wants to provide their service to users by using various ways. To provide better service, service providers need to know their potential customers and the services in which they are interested. Sometimes tracking without users concern could create security issues. This paper presenting, options for secure user enrollment using device fingerprinting with trusted execution environment. In this paper presenting software-based and hardware based approach with the help of Trusted Execution Environment that would enable the secure and practical enrollment, which could enable more widespread secure deployment of various mobile and web security services.


Keywords: Device Fingerprinting, Trusted Execution Environment, Secure Enrollment, Secure Authentication


Edition: Volume 6 Issue 3, March 2017


Pages: 1410 - 1412



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Prathamesh Raut, Bhushan Patil, "Device Fingerprinting for Secure User Enrollment using TEE", International Journal of Science and Research (IJSR), Volume 6 Issue 3, March 2017, pp. 1410-1412, https://www.ijsr.net/getabstract.php?paperid=ART20171641, DOI: https://www.doi.org/10.21275/ART20171641



Similar Articles

Downloads: 117

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1006 - 1011

A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass

Joga Venkata Hari Babu V, G. Lavanya

Share this Article

Downloads: 122

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1316 - 1319

Host Identity Protocol for End-to-End Security in IoT

Huda Mulani, Aruna Gawade

Share this Article

Downloads: 134

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 778 - 783

Multimodal Biometric Authentication System using Face and Fingerprint Features with Feature Level Fusion

Randeep Kaur, Rishmjot Kaur

Share this Article

Downloads: 146

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 412 - 414

Secure Authentication and Cyber Crime Mitigation for Social Networking Sites

Anjitha T, Harsha V

Share this Article



Top