Device Fingerprinting for Secure User Enrollment using TEE
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 6 Issue 3, March 2017

Device Fingerprinting for Secure User Enrollment using TEE

Prathamesh Raut, Bhushan Patil

Mobile phone users access content from web-sites using their browsers and nowadays as the power of mobile devices gone to high level compared to old handsets, every service provider wants to provide their service to users by using various ways. To provide better service, service providers need to know their potential customers and the services in which they are interested. Sometimes tracking without users concern could create security issues. This paper presenting, options for secure user enrollment using device fingerprinting with trusted execution environment. In this paper presenting software-based and hardware based approach with the help of Trusted Execution Environment that would enable the secure and practical enrollment, which could enable more widespread secure deployment of various mobile and web security services.

Keywords: Device Fingerprinting, Trusted Execution Environment, Secure Enrollment, Secure Authentication

Edition: Volume 6 Issue 3, March 2017

Pages: 1410 - 1412

Share this Article

How to Cite this Article?

Prathamesh Raut, Bhushan Patil, "Device Fingerprinting for Secure User Enrollment using TEE", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20171641, Volume 6 Issue 3, March 2017, 1410 - 1412

101 PDF Views | 92 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Secure Authentication'

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1410 - 1412

Device Fingerprinting for Secure User Enrollment using TEE

Prathamesh Raut, Bhushan Patil

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1006 - 1011

A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass

Joga Venkata Hari Babu V, G. Lavanya

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1316 - 1319

Host Identity Protocol for End-to-End Security in IoT

Huda Mulani, Aruna Gawade

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 778 - 783

Multimodal Biometric Authentication System using Face and Fingerprint Features with Feature Level Fusion

Randeep Kaur, Rishmjot Kaur

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 412 - 414

Secure Authentication and Cyber Crime Mitigation for Social Networking Sites

Anjitha T, Harsha V

Share this Article
Top