Research Article

Secure OpenID Authentication Model by Using Trusted Computing

Figure 2

User authentication based on I-PIN [17].