International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109

Review Papers | Computer Science & Engineering | India | Volume 6 Issue 3, March 2017


Device Fingerprinting for Secure User Enrollment using TEE

Prathamesh Raut | Bhushan Patil [2]


Abstract: Mobile phone users access content from web-sites using their browsers and nowadays as the power of mobile devices gone to high level compared to old handsets, every service provider wants to provide their service to users by using various ways. To provide better service, service providers need to know their potential customers and the services in which they are interested. Sometimes tracking without users concern could create security issues. This paper presenting, options for secure user enrollment using device fingerprinting with trusted execution environment. In this paper presenting software-based and hardware based approach with the help of Trusted Execution Environment that would enable the secure and practical enrollment, which could enable more widespread secure deployment of various mobile and web security services.


Keywords: Device Fingerprinting, Trusted Execution Environment, Secure Enrollment, Secure Authentication


Edition: Volume 6 Issue 3, March 2017,


Pages: 1410 - 1412


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Prathamesh Raut, Bhushan Patil, "Device Fingerprinting for Secure User Enrollment using TEE", International Journal of Science and Research (IJSR), Volume 6 Issue 3, March 2017, pp. 1410-1412, https://www.ijsr.net/get_abstract.php?paper_id=ART20171641

Similar Articles with Keyword 'Secure Authentication'

Downloads: 117

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1006 - 1011

A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass

Joga Venkata Hari Babu V | G. Lavanya

Share this Article

Downloads: 122

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1316 - 1319

Host Identity Protocol for End-to-End Security in IoT

Huda Mulani | Aruna Gawade [2]

Share this Article
Top