Research Article

Trusted Computing Strengthens Cloud Authentication

Figure 19

Phishing Relying Party website.
260187.fig.0019