Figure 2From: Local user-centric identity management Trusted interactions in the presence of malware-infected clients. Back to article page